DBSec B

28 papers

YearTitle / Authors
1990Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989
David L. Spooner, Carl E. Landwehr
1989A Comparison of Three Secure DBMS Architectures.
Richard D. Graubart
1989A Layered TCB Implementation versus the Hinke-Schaefer Approach.
Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu
1989An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center.
John R. Campbell
1989Application Information Security Semantics: A Case of Mental Health Delivery.
T. C. Ting
1989Audit Trail Organization in Relational Databases.
Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley
1989Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria.
Richard D. Graubart
1989Constructing Containers Using a Multilevel Relational Data Model.
Catherine Meadows
1989Conversation Structures as a Means of Specifying Security Policy.
John E. Dobson
1989DBMS Trusted Computing Base Taxonomy.
Thomas H. Hinke
1989Database Inference Controller.
Leoan J. Buczkowski
1989Discussion Summary.
Ravi S. Sandhu
1989Formal Specification of a Mental Health Delivery System.
Richard A. Kemmerer
1989Handling Security Violations within an Integrity Lock DBMS.
Hilary H. Hosmer
1989Mandatory Controls for Database Integrity.
Ravi S. Sandhu
1989Multilevel Security for Object-Oriented Database Systems.
Teresa F. Lunt
1989Multivalued Dependency Inferences in Multilevel Relational Database Systems.
Tzong-An Su, Gultekin Özsoyoglu
1989On the Problem of Security in Data Bases.
Simon R. Wiseman
1989Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines.
Joachim Biskup
1989Prototyping the SODA Model.
Thomas F. Keefe, Wei-Tek Tsai
1989Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI.
Marvin Schaefer, Brian Hubbard
1989Research Question List, Answers, and Revision.
Carl E. Landwehr
1989Security Algebras and Formal Models: Using Petri Net Theory.
Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood
1989Security Policies for Integrated Project Support Environments.
John Alexander McDermid, Ernest S. Hocking
1989Security Policies in Object-Oriented Databases.
María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández
1989Solving Multilevel Database Security Problems: Technology Is Not Enough.
Gary W. Smith
1989The LDV Approach to Database Security.
J. Thomas Haigh, Richard C. O'Brien, Paul D. Stachour, Dana L. Toups
1989Using Exess as a Framework for Secure DBMSs.
David A. Bonyun