default search action
4. DBSec 1990: Halifax, U.K.
- Sushil Jajodia, Carl E. Landwehr:
Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990. North-Holland 1991, ISBN 0-444-89076-9
Applications
- Bruce I. Blum:
Computer Security in a Clinical Environment. DBSec 1990: 1-12 - LouAnna Notargiacomo, Richard D. Graubart:
Health Delivery: The Problem solved? DBSec 1990: 13-26 - Richard A. Kemmerer:
A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
Object_Oriented Systems
- Matthew Morgenstern:
A Security Model for Multilevel Objects with Bidirectional Relationships. DBSec 1990: 53-72 - Donald B. Faatz, David L. Spooner:
Discretionary Access Control in Object-Oriented Engineering Database Systems. DBSec 1990: 73-84 - Ehud Gudes, Haiyan Song, Eduardo B. Fernández:
Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 - Bhavani Thuraisingham:
Multilevel Security for Multimedia Database Systems. DBSec 1990: 99-116
Policies and Models
- Mike Martin, John E. Dobson:
Enterprise Modeling and Security Policies. DBSec 1990: 117-150 - D. J. Thomsen:
Role-Based Application Design and Enforcement. DBSec 1990: 151-168 - Joachim Biskup:
A General Framework for Database Security (Abstract). DBSec 1990: 169-170 - Marshall D. Abrams, Gary W. Smith:
A Generalized Framework for Database Access Controls. DBSec 1990: 171-178
Integrity
- Ravi S. Sandhu:
Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190 - Simon R. Wiseman:
The Control of Integrity in Databases. DBSec 1990: 191-204 - Edgar H. Sibley, Gary W. Smith:
On the Behavior of Multilevel Database Systems. DBSec 1990: 205-220 - David K. Hsiao, Matthew J. Kohler, Shawn W. Stround:
Query Modifications as a Means of Controlling Access to Multilevel Secure Databases. DBSec 1990: 221-240
Integration of Security Considerations with DBMS Development
- Catherine Meadows:
Policies for Dynamic Upgrading. DBSec 1990: 241-250 - Hilary H. Hosmer:
Shared Sensitivity Labels. DBSec 1990: 251-264
Multilevel Secure Relational Databases
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen:
The LDV Secure Relational DBMS Model. DBSec 1990: 265-280 - Teresa F. Lunt, Donovan Hsieh:
Update Semantics for a Multilevel Relational Database System. DBSec 1990: 281-296 - Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308
Aggregation and Inference
- Barry Sowerbutts, Shanda Cordingley:
Database Architectonics and Inferential Security. DBSec 1990: 309-325 - Tsau Young Lin:
Multilevel Database and Aggregated Security Algebra. DBSec 1990: 325-350
Past, Present and Future
- Marvin Schaefer:
Reflexions on Current Issues in Trusted DBMS. DBSec 1990: 351-370 - David A. Bonyum:
The Third Stream: Long-Term Prospects for Secure Database Management. DBSec 1990: 371-380 - John R. Campbell:
A Research and Development Program for Trusted Distributed Database Systems. DBSec 1990: 381-394 - Catherine Meadows:
Discussion Summary. DBSec 1990: 395-404 - Carl E. Landwehr:
Research Question List. DBSec 1990: 405-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.