default search action
9. DBSec 1995: Rensselaerville, New York, USA
- David L. Spooner, Steven A. Demurjian, John E. Dobson:
Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995. IFIP Conference Proceedings 51, Chapman & Hall 1996, ISBN 0-412-72920-2
Oppening Session
- T. C. Ting:
How Secure is Secure: Some Thoughts on Security Metrics. DBSec 1995: 3-7 - John E. Dobson, Mike Martin:
Messages, Communication, Information Security: Protecting the User from the Data. DBSec 1995: 8-23
Federated and Replicated Databases
- Martin S. Olivier:
Self-protecting Objects in a Secure Federated Database. DBSec 1995: 27-42 - Dirk Jonscher, Klaus R. Dittrich:
Argos - A Configurable Access Control System for Interoperable Environments. DBSec 1995: 43-60 - Ira S. Moskowitz, Myong H. Kang:
The Modulated-Input Modulated-Output Model. DBSec 1995: 61-75
Object-Oriented Systems
- Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu:
URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 - Eduardo B. Fernández, Robert B. France, D. Wei:
A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110 - Marvin Schaefer, P. Martel, T. Kanawati, V. Lyons:
Multilevel Data Model for the Trusted ONTOS Prototype. DBSec 1995: 111-126
Mandatory Access Control
- Matunda Nyanchama, Sylvia L. Osborn:
Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144 - Frédéric Cuppens, Alban Gabillon:
Modelling a Multilevel Database with Temporal Downgrading Functionalities. DBSec 1995: 145-164 - Xiaolei Qian, Teresa F. Lunt:
Towards a MAC Policy Framework. DBSec 1995: 165-180
Concurrency Control
- Shankar Pal:
A Locking Protocol for MLS Databases Providing Support For Long Transactions. DBSec 1995: 183-198 - Sang Hyuk Son, Rasikan David, Bhavani Thuraisingham:
An Adaptive Policy for Improved Timeliness in Secure Database Systems. DBSec 1995: 199-214 - Ravi Mukkamala, Sang Hyuk Son:
A Secure Concurrency Control Protocol for Real-Time Databases. DBSec 1995: 215-230 - Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247
Design and Implementation of Access Controls
- Marvin Schaefer, Gary W. Smith:
Assured Discretionary Access Control for Trusted RDBMS. DBSec 1995: 251-266 - Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:
A Formal Security Design Approach for Information Exchange in Organisations. DBSec 1995: 267-285
Role-Based Access Control and Next Generation Security Models
- Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:
Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298
Inference Detection
- Rae K. Burns:
Inference Analysis During Multilevel Database Design. DBSec 1995: 301-316 - Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi:
A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332 - Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. DBSec 1995: 333-348
Secure Commercial Database Systems
- Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington:
Customer Requirements for Security in Relational Database Management. DBSec 1995: 351-361
Storage Jamming and Wrap-up
- John P. McDermott, David M. Goldschlag:
Storage Jamming. DBSec 1995: 365-381 - John E. Dobson:
Report of Discussion Sessions Following Presentations. DBSec 1995: 382-387
Informal Evening Session: Data Mining
- Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani Thuraisingham:
Security and Data Mining. DBSec 1995: 391-399
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.