Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy |
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Liwu Chang, Ira S. Moskowitz |
An Integrated Framework for Database Privacy Protection. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Gio Wiederhold |
Protecting Information when Access is Granted for Collaboration. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Premkumar T. Devanbu, Michael Gertz 0001, Charles U. Martel, Stuart G. Stubblebine |
Authentic Third-party Data Publication. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Sylvia L. Osborn |
Database Security Integration using Role-Based Access Control. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
XML Access Control Systems: A Component-Based Approach. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Vijayalakshmi Atluri, John Hale (eds.) |
Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA |
DBSec |
2000 |
DBLP BibTeX RDF |
|
1 | Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold |
Panel. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Spalka, Armin B. Cremers |
The Effect of Confidentiality on the Structure of Databases. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia (eds.) |
Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Yun Bai 0001, Vijay Varadharajan |
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Savith Kandala, Ravi S. Sandhu |
Extending The BFA Workflow Authorization Model to Express Weighted Voting. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Arnon Rosenthal, Edward Sciore, Vinti Doshi |
Security Administration for Federations, Warehouses, and other Derived Data. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta |
RBAC on the Web by Secure Cookies. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Chris Clifton |
Protecting Against Data Mining through Samples. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz |
A Strategy for an MLS Workflow Management System. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Ioannis Mavridis, George Pangalos, Marie Khair |
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Yasunori Ishihara, Toshiyuki Morita, Minoru Ito |
The Security Problem against Inference Attacks on Object-Oriented Databases. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Tom Johnsten, Vijay V. Raghavan 0001 |
Impact of Decision-Region Based Classification Mining Algorithms on Database Security. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Ravi Mukkamala, Jason Gagnon, Sushil Jajodia |
Integrating Data Mining Techniques with Intrusion Detection Methods. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Anup K. Ghosh, Aaron Schwartzbard |
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Andrew Po-Jung Ho |
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Donald G. Marks |
Enforcing Integrity While Maintaining Secrecy. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Steve Barker |
Temporal Authorization in the Simplified Event Calculus. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Steven A. Demurjian, Y. He, T. C. Ting, M. Saba |
Software Agents for Role Based Security. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
For Unknown Secrecies Refusal is Better than Lying. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Peng Liu 0005, Sushil Jajodia, Catherine D. McCollum |
Intrusion Confinement by Isolation in Information Systems. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino |
Specifying and Computing Hierarchies of Temporal Authorizations. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin |
Panel on Intrusion Detection. |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield |
Selected Topics in Infrastructure and Information Assurance (Panel). |
DBSec |
1999 |
DBLP BibTeX RDF |
|
1 | Brajendra Panda, Joseph Giordano |
Reconstructing the Database after Electronic Attacks. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | John Hale, Mauricio Papa, Sujeet Shenoi |
Programmable Security for Object-Oriented Systems. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Ehud Gudes, Martin S. Olivier |
Security Policies in Replicated and Autonomous Databases. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Astrid Lubinski |
Security Issues in Mobile Database Access. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier |
Security and Privacy Issues for the World Wide Web: Panel Discussion. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Jérôme Carrère, Frédéric Cuppens, Claire Saurel |
SACADDOS: A Support Tool to Manage Multilevel Documents. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Liwu Chang, Ira S. Moskowitz |
Bayesian Methods to the Database Inference Problem. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Anup K. Ghosh |
E-Commerce Security: No Silver Bullet. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Lucas C. J. Dreyer, Martin S. Olivier |
An Information-Flow for Privacy (InfoPriv). |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup, Ulrich Flegel, Yücel Karabulut |
Secure Mediation: Requirements and Design. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Tsau Young Lin, Shelly Qian (eds.) |
Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting |
Role Based Security and Java. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Silvana Castano, Maria Grazia Fugini |
Rules and Patterns for Security in Workflow Systems. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Vijayalakshmi Atluri, David L. Spooner |
Workshop Summary. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Wolfgang Eßmayr, Elisabeth Kapsammer, Roland R. Wagner, A Min Tjoa |
Using Role-Templates for Handling Recurring Role Structures. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Raymond W. Yip, Karl N. Levitt |
The Design and Implementation of a Data Level Database Inference Detection System. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Wei-kuang Huang, Vijayalakshmi Atluri |
Analysing the Safety of Workflow Authorization Models. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
Technical Enforcement of Informational Assurances. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | Ramprasad Sripada, Thomas F. Keefe |
Version Management in the STAR MLS Database System. |
DBSec |
1998 |
DBLP BibTeX RDF |
|
1 | John P. McDermott |
Replication Does Survive Information Warfare Attacks. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Elisa Bertino, Elena Ferrari |
Administration Policies in a Multipolicy Autorization System. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Kan Zhang |
IRI: A Quantitative Approach to Inference Analysis in Relational Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray |
A Two-tier Coarse Indexing Scheme for MLS Database Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier |
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi |
Implementing Advanced Internet Search Engines. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Adrian Spalka, Armin B. Cremers |
Structured Name-Spaces in Secure Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Elisa Bertino, Elena Ferrari |
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton |
Security Issues in Data Warehousing and Data Mining: Panel Discussion. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Gio Wiederhold, Michel Bilello, Chris Donahue |
Web Implementation of a Security Mediator for Medical Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Tsau Young Lin, Xiaoling Zuo |
Multilevel Decision Logic: A Formalism for Rules Mining. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino |
An Execution Model for Multilevel Seccure Workflows. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu, Venkata Bhamidipati |
The URA97 Model for Role-Based User-Role Assignment. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Pierangela Samarati, Ravi S. Sandhu (eds.) |
Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | John Hale, Jody Threet, Sujeet Shenoi |
Capability-Based Primitives for Access Control in Object-Oriented Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Roshan K. Thomas, Ravi S. Sandhu |
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Zahir Tari |
Designing Security Agents for the DOK Federated System. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Steven A. Demurjian, T. C. Ting, John A. Reisner |
Software Architectural Alternatives for User Role-Based Security Policies. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Sang Hyuk Son, Craig Chaney |
Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas |
Distributed Object Technologies, Databases and Security. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Masha Gendler-Fishman, Ehud Gudes |
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Wolfgang Eßmayr, Günther Pernul, A Min Tjoa |
Access Controls by Object-Oriented Concepts. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Latanya Sweeney |
Datafly: A System for Providing Anonymity in Medical Data. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Chanjung Park, Seog Park, Sang Hyuk Son |
Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi |
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens, Alban Gabillon |
A Logical Approach to Model a Multilevel Object-Oriented Database. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Strategic Directions in Computer Security. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Bhavani Thuraisingham |
Security Issues for Data Warehousing and Data Mining. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu, J. Campbell |
Open Issues in Database Security. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | David L. Spooner, Steven A. Demurjian, John E. Dobson (eds.) |
Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995 |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | David L. Spooner |
Summary of the Working Conference. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf |
A Framework for Inference-Directed Data Mining. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Janet Aisbett |
An Information Theoretic Analysis of Architectures for Multilevel Secure Databases. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala |
Multilevel Secure Transaction Processing: Status and Prospects. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Steven A. Demurjian, T. C. Ting, Margaretha W. Price, M.-Y. Hu |
Extensible and Reusable Role-Based Object-Oriented Security. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia, Luigi V. Mancini, Indrajit Ray |
Secure Locking Protocols for Multilevel Database Management Systems. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu, LouAnna Notargiacomo, D. Thomas, Jesse C. Worthington |
Implementation Experiences and Prospects. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Zahir Tari, George Fernandez |
Security Enforcement in the DOK Federated Database System. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Silvana Castano |
An Approach to Deriving Global Authorizations in Federated Database Systems. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | John Hale, Jody Threet, Sujeet Shenoi |
A Framework for High Assurance Security of Distributed Objects. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Sylvia L. Osborn, Laura K. Reid, Gregory J. Wesson |
On the Interaction Between Role-Based Access Control and Relational Databases. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Reind P. van de Riet, Ehud Gudes |
An Object-Oriented Database Architecture for Providing Securty in Cyberspace. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | Martin S. Olivier |
Integrity Constraints in Federated Databases. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | G. Grossman, Marvin Schaefer |
A Data Model for a Multilevel Replicated X.500 Server. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
1 | John E. Dobson |
Report of Discussion Sessions Following Presentations. |
DBSec |
1995 |
DBLP BibTeX RDF |
|
1 | John P. McDermott, David M. Goldschlag |
Storage Jamming. |
DBSec |
1995 |
DBLP BibTeX RDF |
|
1 | T. C. Ting |
How Secure is Secure: Some Thoughts on Security Metrics. |
DBSec |
1995 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens, Alban Gabillon |
Modelling a Multilevel Database with Temporal Downgrading Functionalities. |
DBSec |
1995 |
DBLP BibTeX RDF |
|
1 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia |
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. |
DBSec |
1995 |
DBLP BibTeX RDF |
|
1 | Rae K. Burns |
Inference Analysis During Multilevel Database Design. |
DBSec |
1995 |
DBLP BibTeX RDF |
|