default search action
8. DBSec 1994: Bad Salzdetfurth, Germany
- Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr:
Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994. IFIP Transactions A-60, North-Holland 1994, ISBN 0-444-81976-2
Invited Lectures
- A. R. Bakker:
Special Care Needed for the Heart of Medical Information Systems. DBSec 1994: 3-10 - Klaus R. Dittrich, Dirk Jonscher:
Current Trends in Database Technology and Their Impact on Security Concepts. DBSec 1994: 11-33
User Groups and Roles
- Matunda Nyanchama, Sylvia L. Osborn:
Access Rights Administration in Role-Based Security Systems. DBSec 1994: 37-56 - Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez:
User Group Structures in Object-Oriented Database Authorization. DBSec 1994: 57-76 - M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. DBSec 1994: 77-94
Database Architecture
- Oliver Costich, Myong H. Kang, Judith N. Froscher:
The SINTRA Data Model: Structure and Operations. DBSec 1994: 97-110 - John P. McDermott:
The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. DBSec 1994: 111-122 - James P. O'Connor:
Trusted RUBIX: A Multilevel Secure Client-Server DBMS. DBSec 1994: 123-136
Inference Analysis and Control
- John Hale, Jody Threet, Sujeet Shenoi:
A Practical Formalism for Imprecise Inference Control. DBSec 1994: 139-156 - Donald G. Marks, Leonard J. Binns, Bhavani Thuraisingham:
Hypersemantic Data Modeling for Inference Analysis. DBSec 1994: 157-180
Database Models
- Martin S. Olivier:
A Multilevel Secure Federated Database. DBSec 1994: 183-198 - Elisa Bertino, Fabio Origgi, Pierangela Samarati:
A new Authorization Model for Object-Oriented Databases. DBSec 1994: 199-222 - Reind P. van de Riet, Jack Beukering:
The Integration of Security and Integrity Constraints in MOKUM. DBSec 1994: 223-244
Queries, Updates, and Transactions
- Simon R. Wiseman:
Field Level Classification and SQL. DBSec 1994: 247-258 - Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274
Policy Modelling
- Laurence Cholvy, Frédéric Cuppens:
Providing Consistent Views in a Polyinstantiated Database. DBSec 1994: 277-296 - Adrian Spalka:
Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets. DBSec 1994: 297-316
Access Control and Application Design
- Arnon Rosenthal, James G. Williams, William R. Herndon, Bhavani Thuraisingham:
A Fine-grained Access Control Model for Object-Oriented DBMSs. DBSec 1994: 319-334 - Todd Gross:
Creating Abstract Discretation Modification Policies with Reconfigurable Data Objects. DBSec 1994: 335-351 - George Pangalos:
Security Guidelines for Database Systems Development. DBSec 1994: 353-370
Status Reports on Current Projects and Panel
- Marvin Schaefer, Sandra Wade:
Trusted ONTOS Prototype: Preliminary Considerations. DBSec 1994: 373 - Günther Pernul:
Security Object Modelling for Level-Based Policies. DBSec 1994: 374 - Joachim Biskup, Christian Eckert:
Enforcement of State Dependent Security Specifications. DBSec 1994: 375 - Marvin Schaefer:
A Contemporary Survey of Discretion Access Control Policy Assurance in Commercial Trusted Relational DBMS. DBSec 1994: 376 - Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer:
Perspectives on Database Security - Panel Summary. DBSec 1994: 377-390
Discussion Summary
- Matthew Morgenstern:
Summary of Conference Discussions. DBSec 1994: 393-403
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.