Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 1998
- Tsau Young Lin, Shelly Qian:
Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA. IFIP Conference Proceedings 113, Chapman & Hall 1998, ISBN 0-412-82090-0 [contents] - 1997
- Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165 - M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi:
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. DBSec 1997: 385-388 - Elisa Bertino, Elena Ferrari:
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. DBSec 1997: 95-109 - Elisa Bertino, Elena Ferrari:
Administration Policies in a Multipolicy Autorization System. DBSec 1997: 341-355 - Steven A. Demurjian, T. C. Ting, John A. Reisner:
Software Architectural Alternatives for User Role-Based Security Policies. DBSec 1997: 247-261 - Wolfgang Eßmayr, Günther Pernul, A Min Tjoa:
Access Controls by Object-Oriented Concepts. DBSec 1997: 325-340 - Masha Gendler-Fishman, Ehud Gudes:
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. DBSec 1997: 110-133 - Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier:
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. DBSec 1997: 182-195 - John Hale, Jody Threet, Sujeet Shenoi:
Capability-Based Primitives for Access Control in Object-Oriented Systems. DBSec 1997: 134-148 - Sushil Jajodia, Ravi Mukkamala, Indrajit Ray:
A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 - Tsau Young Lin, Xiaoling Zuo:
Multilevel Decision Logic: A Formalism for Rules Mining. DBSec 1997: 307-321 - Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi:
Implementing Advanced Internet Search Engines. DBSec 1997: 389-391 - Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas:
Distributed Object Technologies, Databases and Security. DBSec 1997: 17-31 - John P. McDermott:
Replication Does Survive Information Warfare Attacks. DBSec 1997: 219-228 - Chanjung Park, Seog Park, Sang Hyuk Son:
Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. DBSec 1997: 229-244 - Ravi S. Sandhu, Venkata Bhamidipati:
The URA97 Model for Role-Based User-Role Assignment. DBSec 1997: 262-275 - Sang Hyuk Son, Craig Chaney:
Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. DBSec 1997: 73-91 - Adrian Spalka, Armin B. Cremers:
Structured Name-Spaces in Secure Databases. DBSec 1997: 291-306 - Latanya Sweeney:
Datafly: A System for Providing Anonymity in Medical Data. DBSec 1997: 356-381 - Zahir Tari:
Designing Security Agents for the DOK Federated System. DBSec 1997: 35-59 - Roshan K. Thomas, Ravi S. Sandhu:
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. DBSec 1997: 166-181 - Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton:
Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 - Gio Wiederhold, Michel Bilello, Chris Donahue:
Web Implementation of a Security Mediator for Medical Databases. DBSec 1997: 60-72 - Kan Zhang:
IRI: A Quantitative Approach to Inference Analysis in Relational Databases. DBSec 1997: 279-290
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-26 17:27 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint