DBSec B

25 papers

YearTitle / Authors
1998Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA
Tsau Young Lin, Shelly Qian
1997A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases.
Elisa Bertino, Elena Ferrari
1997A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Sushil Jajodia, Ravi Mukkamala, Indrajit Ray
1997Access Controls by Object-Oriented Concepts.
Wolfgang Eßmayr, Günther Pernul, A Min Tjoa
1997Administration Policies in a Multipolicy Autorization System.
Elisa Bertino, Elena Ferrari
1997Alter-egos and Roles: Supporting Workflow Security in Cyberspaces.
Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier
1997An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects.
M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
1997An Execution Model for Multilevel Seccure Workflows.
Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
1997Capability-Based Primitives for Access Control in Object-Oriented Systems.
John Hale, Jody Threet, Sujeet Shenoi
1997Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases.
Masha Gendler-Fishman, Ehud Gudes
1997Datafly: A System for Providing Anonymity in Medical Data.
Latanya Sweeney
1997Designing Security Agents for the DOK Federated System.
Zahir Tari
1997Distributed Object Technologies, Databases and Security.
Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas
1997IRI: A Quantitative Approach to Inference Analysis in Relational Databases.
Kan Zhang
1997Implementing Advanced Internet Search Engines.
Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi
1997Multilevel Decision Logic: A Formalism for Rules Mining.
Tsau Young Lin, Xiaoling Zuo
1997Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems.
Chanjung Park, Seog Park, Sang Hyuk Son
1997Replication Does Survive Information Warfare Attacks.
John P. McDermott
1997Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
1997Software Architectural Alternatives for User Role-Based Security Policies.
Steven A. Demurjian, T. C. Ting, John A. Reisner
1997Structured Name-Spaces in Secure Databases.
Adrian Spalka, Armin B. Cremers
1997Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments.
Sang Hyuk Son, Craig Chaney
1997Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management.
Roshan K. Thomas, Ravi S. Sandhu
1997The URA97 Model for Role-Based User-Role Assignment.
Ravi S. Sandhu, Venkata Bhamidipati
1997Web Implementation of a Security Mediator for Medical Databases.
Gio Wiederhold, Michel Bilello, Chris Donahue