Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Edgar H. Sibley, James Bret Michael, Richard L. Wexelblat |
Use of an Experimental Policy Workbench: Description and Preliminary Results. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens, Kioumars Yazdanian |
Logic Hints and Security in Relational Databases. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Paul Ammann, Sushil Jajodia |
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Gottfried Luef, Günther Pernul |
Supporting Range Queries in Multilevel-Secure Databases. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, David L. Spooner |
Security Issues in Federated Database Systems: Panel Contributions. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Philip Morris, John A. McDermid |
The Structure of Permissions: A Normative Framework for Access Rights. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia, Carl E. Landwehr (eds.) |
Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990 |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Hans Hermann Brüggemann |
Rights in an Object-Oriented Environment. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | T. C. Ting, Steven A. Demurjian, M.-Y. Hu |
Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Simon R. Wiseman |
Abstract and Concrete Models for Secure Database Applications. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Thomas L. Lincoln, Daniel J. Essin |
The Computer-Based Patient Record: Issues of Organization, Security and Confidentiality. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | John E. Dobson |
Information and Denial of Service. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Oliver Costich |
Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens |
A Modal Logic Framework to Solve Aggregation Problems. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Bhavani Thuraisingham |
The Use of Conceptual Structures for Handling the Inference Problem. |
DBSec |
1991 |
DBLP BibTeX RDF |
|
1 | Richard A. Kemmerer |
A Multilevel Formal Specification of a Mental Health Care Database. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
A General Framework for Database Security (Abstract). |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Marvin Schaefer |
Reflexions on Current Issues in Trusted DBMS. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt, Donovan Hsieh |
Update Semantics for a Multilevel Relational Database System. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Donald B. Faatz, David L. Spooner |
Discretionary Access Control in Object-Oriented Engineering Database Systems. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia, Ravi S. Sandhu |
Polyinstantiation Integrity in Multilevel Relations Revisited. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Marshall D. Abrams, Gary W. Smith |
A Generalized Framework for Database Access Controls. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | David K. Hsiao, Matthew J. Kohler, Shawn W. Stround |
Query Modifications as a Means of Controlling Access to Multilevel Secure Databases. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Ehud Gudes, Haiyan Song, Eduardo B. Fernández |
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Bhavani Thuraisingham |
Multilevel Security for Multimedia Database Systems. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Edgar H. Sibley, Gary W. Smith |
On the Behavior of Multilevel Database Systems. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu |
Separation of Duties in Computerized Information Systems. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Policies for Dynamic Upgrading. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen |
The LDV Secure Relational DBMS Model. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | LouAnna Notargiacomo, Richard D. Graubart |
Health Delivery: The Problem solved? |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | John R. Campbell |
A Research and Development Program for Trusted Distributed Database Systems. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | David L. Spooner, Carl E. Landwehr (eds.) |
Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989 |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | David A. Bonyum |
The Third Stream: Long-Term Prospects for Secure Database Management. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Hilary H. Hosmer |
Shared Sensitivity Labels. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Bruce I. Blum |
Computer Security in a Clinical Environment. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Carl E. Landwehr |
Research Question List. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Simon R. Wiseman |
The Control of Integrity in Databases. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Mike Martin, John E. Dobson |
Enterprise Modeling and Security Policies. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Tsau Young Lin |
Multilevel Database and Aggregated Security Algebra. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | D. J. Thomsen |
Role-Based Application Design and Enforcement. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Discussion Summary. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Matthew Morgenstern |
A Security Model for Multilevel Objects with Bidirectional Relationships. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Barry Sowerbutts, Shanda Cordingley |
Database Architectonics and Inferential Security. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu |
Discussion Summary. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | T. C. Ting |
Application Information Security Semantics: A Case of Mental Health Delivery. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Thomas H. Hinke |
DBMS Trusted Computing Base Taxonomy. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Thomas F. Keefe, Wei-Tek Tsai |
Prototyping the SODA Model. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Simon R. Wiseman |
On the Problem of Security in Data Bases. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood |
Security Algebras and Formal Models: Using Petri Net Theory. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu |
A Layered TCB Implementation versus the Hinke-Schaefer Approach. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández |
Security Policies in Object-Oriented Databases. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Multilevel Security for Object-Oriented Database Systems. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Ravi S. Sandhu |
Mandatory Controls for Database Integrity. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Hilary H. Hosmer |
Handling Security Violations within an Integrity Lock DBMS. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | J. Thomas Haigh, Richard C. O'Brien, Paul D. Stachour, Dana L. Toups |
The LDV Approach to Database Security. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Leoan J. Buczkowski |
Database Inference Controller. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Richard A. Kemmerer |
Formal Specification of a Mental Health Delivery System. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Catherine Meadows 0001 |
Constructing Containers Using a Multilevel Relational Data Model. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | John E. Dobson |
Conversation Structures as a Means of Specifying Security Policy. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Richard D. Graubart |
A Comparison of Three Secure DBMS Architectures. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Tzong-An Su, Gultekin Özsoyoglu |
Multivalued Dependency Inferences in Multilevel Relational Database Systems. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Richard D. Graubart |
Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Marvin Schaefer, Brian Hubbard |
Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley |
Audit Trail Organization in Relational Databases. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | John Alexander McDermid, Ernest S. Hocking |
Security Policies for Integrated Project Support Environments. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Carl E. Landwehr |
Research Question List, Answers, and Revision. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Gary W. Smith |
Solving Multilevel Database Security Problems: Technology Is Not Enough. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Carl E. Landwehr (eds.) |
Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988 |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | David A. Bonyun |
Using Exess as a Framework for Secure DBMSs. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | John R. Campbell |
An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. |
DBSec |
1989 |
DBLP BibTeX RDF |
|
1 | Cristi Garvey, Nancy R. Jensen, Jackson Wilson |
The Advanced Secure DBMS: Making Secure DBMSs Usable. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup, Hans-Werner Graf |
Analysis of the Privacy Model for the Information System DORIS. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Gregory S. Hoppenstand, David K. Hsiao |
Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Nancy R. Jensen |
System Security Officer Functions in the A1 Secure DBMS. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Judith N. Froscher, Catherine Meadows 0001 |
Achieving a Trusted Database Management System Using Parallelism. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Multilevel Database Systems: Meeting Class A1. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | John E. Dobson, John A. McDermid |
Security Models and Enterprise Models. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr |
Discussion Notes and Research Question List. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle |
Discretionary Access Control in Structurally Object-Oriented Database Systems. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt |
Access Control Policies for Database Systems. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Hilary H. Hosmer, Rae K. Burns |
Designing Multilevel Secure Distributed Databases. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Carl E. Landwehr (eds.) |
Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987 |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
Security by Permission in Databases. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Tsau Young Lin |
A Generalized Information Flow Model and the Role of System Security Officer. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Ion Tim Ieong, T. C. Ting |
An Analysis of Database Security with Queries for High Order Statistical Information. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Norman S. Matloff, Patrick Tendick |
The 'Curse of Dimensionality' in Database Security. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Ronda R. Henning, Richard P. Simonian |
Security Analysis of database Schema Information. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham |
Prototyping as a Research Tool for MLS/DBMS. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | David L. Spooner |
The Impact of Inheritance on Security in Object-Oriented Database Systems. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Thomas H. Hinke |
Database Inference Engine Design Approach. |
DBSec |
1988 |
DBLP BibTeX RDF |
|
1 | Carl E. Landwehr |
Database Security: Where are We? |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | Lawrence H. Cox |
Modelling and Controlling User Inference. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | David K. Hsiao |
Discussion Notes and Revised Question List. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | Catherine Meadows 0001, Sushil Jajodia |
Integrity Versus Security in Multi-Level Secure Databases. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | Richard A. Kemmerer |
Formal Specification and Verification Techniques for Secure Database Systems. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | J. Thomas Haigh |
Modeling Datbase Security Requirements. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | David L. Spooner |
Relationships between database System and Operating System Security. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | Maria Grazia Fugini |
Secure Database Development Methodologies. |
DBSec |
1987 |
DBLP BibTeX RDF |
|
1 | David A. Bonyun |
Logging and Accountability in Database Management Systems. |
DBSec |
1987 |
DBLP BibTeX RDF |
|