DBSec B

20 papers

YearTitle / Authors
1989Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988
Carl E. Landwehr
1988A Generalized Information Flow Model and the Role of System Security Officer.
Tsau Young Lin
1988Access Control Policies for Database Systems.
Teresa F. Lunt
1988Achieving a Trusted Database Management System Using Parallelism.
Judith N. Froscher, Catherine Meadows
1988An Analysis of Database Security with Queries for High Order Statistical Information.
Ion Tim Ieong, T. C. Ting
1988Analysis of the Privacy Model for the Information System DORIS.
Joachim Biskup, Hans-Werner Graf
1988Database Inference Engine Design Approach.
Thomas H. Hinke
1988Designing Multilevel Secure Distributed Databases.
Hilary H. Hosmer, Rae K. Burns
1988Discretionary Access Control in Structurally Object-Oriented Database Systems.
Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle
1988Discussion Notes and Research Question List.
D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr
1988Multilevel Database Systems: Meeting Class A1.
Teresa F. Lunt
1988Prototyping as a Research Tool for MLS/DBMS.
D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham
1988Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security.
Gregory S. Hoppenstand, David K. Hsiao
1988Security Analysis of database Schema Information.
Ronda R. Henning, Richard P. Simonian
1988Security Models and Enterprise Models.
John E. Dobson, John A. McDermid
1988Security by Permission in Databases.
Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden
1988System Security Officer Functions in the A1 Secure DBMS.
Nancy R. Jensen
1988The 'Curse of Dimensionality' in Database Security.
Norman S. Matloff, Patrick Tendick
1988The Advanced Secure DBMS: Making Secure DBMSs Usable.
Cristi Garvey, Nancy R. Jensen, Jackson Wilson
1988The Impact of Inheritance on Security in Object-Oriented Database Systems.
David L. Spooner