|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 24 keywords
|
|
|
Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
168 | Ravi S. Sandhu, Sushil Jajodia |
Polyinstantation for Cover Stories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 307-328, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
77 | Shashi K. Gadia |
Applicability of Temporal Data Models to Query Multilevel Security Databases: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Temporal Databases, Dagstuhl ![In: Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997), pp. 238-256, 1997, Springer, 3-540-64519-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
belief data, polyinstantiation, dimensional databases, Databases, relational databases, spatial databases, temporal databases, multilevel security |
53 | Ravi S. Sandhu, Fang Chen |
The Multilevel Relational (MLR) Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 1(1), pp. 93-132, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
conidentiality, polyinstantiation, access control, multilevel security |
53 | Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley |
The SeaView Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 593-607, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
policy formalization, new data, SeaView security model, clearances, mandatory security, standard relational model, multilevel relations, discretionary security, application-independent properties, entity integrity, polyinstantiation integrity, classifications, software engineering, relational databases, security of data, users, labeling, data consistency, reference monitor, formal security model, referential integrity, derived data, multilevel database |
32 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
Polyinstantiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 946-948, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek |
Implementing Polyinstantiation as a Strategy for Electronic Commerce Customer Relationship Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Commer. ![In: Int. J. Electron. Commer. 7(2), pp. 9-30, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Mikko T. Siponen |
Database Security and the Problem of Polyinstantiation: a moral scrutiny. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australas. J. Inf. Syst. ![In: Australas. J. Inf. Syst. 10(1), 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
32 | Ravi S. Sandhu, Sushil Jajodia |
Eliminating polyinstantiation securely. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 11(6), pp. 547-562, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Tsau Young Lin |
Attribute Based Data Model and Polyinstantiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Congress (2) ![In: Education and Society - Information Processing '92, Volume 2, Proceedings of the IFIP 12th World Computer Congress, Madrid, Spain, 7-11 September 1992, pp. 472-478, 1992, North-Holland, 0-444-89750-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
32 | Claude Laferriere |
Predicate based polyinstantiation in multi-level secure DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 10(1), pp. 41-49, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Teresa F. Lunt |
Polyinstantiation: An Inevitable Part of a Multilevel World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 236-238, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Catherine Meadows 0001 |
Panel Discussion on the Polyinstantiation Problem: An Introduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 234, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
32 | Dick O'Brien |
The LDV Approach to Polyinstantiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 239-240, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Sushil Jajodia |
Panel Discussion on the Polyinstantiation Problem: A Position Paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 4th IEEE Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings, pp. 235, 1991, IEEE Computer Society, 0-8186-2215-6. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP BibTeX RDF |
|
32 | Doug Nelson, Chip Paradise |
Using polyinstantiation to develop an MLS application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA, pp. 12-22, 1991, IEEE. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt |
A New Polyinstantiation Integrity Constraint for Multilevel Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Third IEEE Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings, pp. 159-165, 1990, IEEE Computer Society, 0-8186-2071-4. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Sushil Jajodia, Ravi S. Sandhu |
Polyinstantiation Integrity in Multilevel Relations Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990, pp. 297-308, 1990, North-Holland, 0-444-89076-9. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
32 | Sushil Jajodia, Ravi S. Sandhu |
Polyinstantiation Integrity in Multilevel Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990, pp. 104-115, 1990, IEEE Computer Society, 0-8186-2060-9. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
29 | Paul D. Stachour, Bhavani Thuraisingham |
Design of LDV: A Multilevel Secure Relational Database Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 2(2), pp. 190-209, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
classification level, polyinstantiation, type enforcement, multilevel secure relational database management system, secure database system, LDV, Lock Data Views, LOgical Coprocessing Kernel, assured pipelines, query processor, update processor, relational databases, operating system, aggregation, security policy, inference, security of data, LOCK, metadata management, Trusted Computing Base |
24 | Young-Hwan Oh, Hae-Young Bae |
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings, pp. 642-643, 2005, Springer, 3-540-25999-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Lan Li, Xinghao Jiang, Jianhua Li 0001 |
Enforce Mandatory Access Control Policy on XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 336-349, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 192-202, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #22 of 22 (100 per page; Change: )
|
|