default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2000
- Vijayalakshmi Atluri, John Hale:
Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA. IFIP Conference Proceedings 171, Kluwer 2000, ISBN 0-7923-7848-2 [contents] - 1999
- Yun Bai, Vijay Varadharajan:
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330 - Steve Barker:
Temporal Authorization in the Simplified Event Calculus. DBSec 1999: 271-284 - Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:
Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300 - Joachim Biskup:
For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141 - Chris Clifton:
Protecting Against Data Mining through Samples. DBSec 1999: 193-207 - Anup K. Ghosh, Aaron Schwartzbard:
Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32 - Andrew Po-Jung Ho:
A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. DBSec 1999: 117-125 - Yasunori Ishihara, Toshiyuki Morita, Minoru Ito:
The Security Problem against Inference Attacks on Object-Oriented Databases. DBSec 1999: 303-316 - Tom Johnsten, Vijay V. Raghavan:
Impact of Decision-Region Based Classification Mining Algorithms on Database Security. DBSec 1999: 177-191 - Savith Kandala, Ravi S. Sandhu:
Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 - Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174 - Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 - William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield:
Selected Topics in Infrastructure and Information Assurance (Panel). DBSec 1999: 97-113 - Donald G. Marks:
Enforcing Integrity While Maintaining Secrecy. DBSec 1999: 237-251 - Ioannis Mavridis, George Pangalos, Marie Khair:
eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. DBSec 1999: 63-78 - Ravi Mukkamala, Jason Gagnon, Sushil Jajodia:
Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46 - Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta:
RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 - Arnon Rosenthal, Edward Sciore, Vinti Doshi:
Security Administration for Federations, Warehouses, and other Derived Data. DBSec 1999: 209-223 - Adrian Spalka, Armin B. Cremers:
The Effect of Confidentiality on the Structure of Databases. DBSec 1999: 253-268 - Steven A. Demurjian, Y. He, T. C. Ting, M. Saba:
Software Agents for Role Based Security. DBSec 1999: 79-93 - T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin:
Panel on Intrusion Detection. DBSec 1999: 227-234
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-07 05:29 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint