


default search action
2. DBSec 1988: Kingston, Ontario, Canada
- Carl E. Landwehr:

Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988. North-Holland 1989, ISBN 0-444-87483-6
Policy and Models
- John E. Dobson, John A. McDermid:

Security Models and Enterprise Models. DBSec 1988: 1-39 - Teresa F. Lunt:

Access Control Policies for Database Systems. DBSec 1988: 41-52 - Nancy R. Jensen:

System Security Officer Functions in the A1 Secure DBMS. DBSec 1988: 53-62 - D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:

Prototyping as a Research Tool for MLS/DBMS. DBSec 1988: 63-84 - Tsau Young Lin:

A Generalized Information Flow Model and the Role of System Security Officer. DBSec 1988: 85-103
Object-Oriented Data Management Systems
- Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle:

Discretionary Access Control in Structurally Object-Oriented Database Systems. DBSec 1988: 105-121 - Joachim Biskup, Hans-Werner Graf:

Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140 - David L. Spooner:

The Impact of Inheritance on Security in Object-Oriented Database Systems. DBSec 1988: 141-150
Distributed DBMSs and Tools
- Judith N. Froscher, Catherine Meadows:

Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 - Hilary H. Hosmer, Rae K. Burns:

Designing Multilevel Secure Distributed Databases. DBSec 1988: 161-165
MLS Database Design and Implementation
- Gregory S. Hoppenstand, David K. Hsiao:

Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. DBSec 1988: 167-176 - Teresa F. Lunt:

Multilevel Database Systems: Meeting Class A1. DBSec 1988: 177-186 - Cristi Garvey, Nancy R. Jensen, Jackson Wilson:

The Advanced Secure DBMS: Making Secure DBMSs Usable. DBSec 1988: 187-195
Inference and Aggregation
- Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden:

Security by Permission in Databases. DBSec 1988: 197-205 - Ion Tim Ieong, T. C. Ting:

An Analysis of Database Security with Queries for High Order Statistical Information. DBSec 1988: 207-223 - Norman S. Matloff, Patrick Tendick:

The 'Curse of Dimensionality' in Database Security. DBSec 1988: 225-232 - Ronda R. Henning, Richard P. Simonian:

Security Analysis of database Schema Information. DBSec 1988: 233-245 - Thomas H. Hinke:

Database Inference Engine Design Approach. DBSec 1988: 247-262
Summary of Proceedings
- D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr:

Discussion Notes and Research Question List. DBSec 1988: 263-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














