


default search action
3. DBSec 1989: Monterey, California, USA
- David L. Spooner, Carl E. Landwehr:

Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989. North-Holland 1990, ISBN 0-444-88701-6
Case Study: Medical Information Systems
- T. C. Ting:

Application Information Security Semantics: A Case of Mental Health Delivery. DBSec 1989: 1-12 - Joachim Biskup:

Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. DBSec 1989: 13-23
Policy and Models
- John E. Dobson:

Conversation Structures as a Means of Specifying Security Policy. DBSec 1989: 25-39 - John Alexander McDermid, Ernest S. Hocking:

Security Policies for Integrated Project Support Environments. DBSec 1989: 41-74 - Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood:

Security Algebras and Formal Models: Using Petri Net Theory. DBSec 1989: 75-96
Requirements and Methods
- Thomas H. Hinke:

DBMS Trusted Computing Base Taxonomy. DBSec 1989: 97-108 - Richard D. Graubart:

Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. DBSec 1989: 109-114 - Gary W. Smith:

Solving Multilevel Database Security Problems: Technology Is Not Enough. DBSec 1989: 115-125 - Catherine Meadows:

Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141
Integration of Security Considerations with DBMS Development
- Ravi S. Sandhu:

Mandatory Controls for Database Integrity. DBSec 1989: 143-150 - Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu:

A Layered TCB Implementation versus the Hinke-Schaefer Approach. DBSec 1989: 151-165 - Richard D. Graubart:

A Comparison of Three Secure DBMS Architectures. DBSec 1989: 167-190 - John R. Campbell:

An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. DBSec 1989: 191-197
Security Problems for Extended Database Technologies
- Teresa F. Lunt:

Multilevel Security for Object-Oriented Database Systems. DBSec 1989: 199-209 - Thomas F. Keefe, Wei-Tek Tsai:

Prototyping the SODA Model. DBSec 1989: 211-235 - David A. Bonyun:

Using Exess as a Framework for Secure DBMSs. DBSec 1989: 237-255 - María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández:

Security Policies in Object-Oriented Databases. DBSec 1989: 257-268
Audit
- Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley:

Audit Trail Organization in Relational Databases. DBSec 1989: 269-281 - Hilary H. Hosmer:

Handling Security Violations within an Integrity Lock DBMS. DBSec 1989: 283-292
Inference and Aggregation
- Tzong-An Su, Gultekin Özsoyoglu:

Multivalued Dependency Inferences in Multilevel Relational Database Systems. DBSec 1989: 293-300 - Simon R. Wiseman:

On the Problem of Security in Data Bases. DBSec 1989: 301-310 - Leoan J. Buczkowski:

Database Inference Controller. DBSec 1989: 311-322 - J. Thomas Haigh, Richard C. O'Brien, Paul D. Stachour, Dana L. Toups:

The LDV Approach to Database Security. DBSec 1989: 323-339
Assurance
- Richard A. Kemmerer:

Formal Specification of a Mental Health Delivery System. DBSec 1989: 341-351
Discussion Summary / Report
- Ravi S. Sandhu:

Discussion Summary. DBSec 1989: 353-365 - Marvin Schaefer, Brian Hubbard:

Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. DBSec 1989: 367-376 - Carl E. Landwehr:

Research Question List, Answers, and Revision. DBSec 1989: 377-394

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














