default search action
12. DBSec 1998: Chalkidiki, Greece
- Sushil Jajodia:
Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece. IFIP Conference Proceedings 142, Kluwer 1999, ISBN 0-7923-8488-1
Invited Talks
- Anup K. Ghosh:
E-Commerce Security: No Silver Bullet. DBSec 1998: 3-16 - Joachim Biskup:
Technical Enforcement of Informational Assurances. DBSec 1998: 17-40
Workflow
- Wei-kuang Huang, Vijayalakshmi Atluri:
Analysing the Safety of Workflow Authorization Models. DBSec 1998: 43-57 - Silvana Castano, Maria Grazia Fugini:
Rules and Patterns for Security in Workflow Systems. DBSec 1998: 59-74
Privacy
- Lucas C. J. Dreyer, Martin S. Olivier:
An Information-Flow for Privacy (InfoPriv). DBSec 1998: 77-90
Policy Modeling
- Ehud Gudes, Martin S. Olivier:
Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 - John Hale, Mauricio Papa, Sujeet Shenoi:
Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123
Mediation
- Joachim Biskup, Ulrich Flegel, Yücel Karabulut:
Secure Mediation: Requirements and Design. DBSec 1998: 127-140
Information Warfare Defense
- Brajendra Panda, Joseph Giordano:
Reconstructing the Database after Electronic Attacks. DBSec 1998: 143-156
Multilevel Security
- Ramprasad Sripada, Thomas F. Keefe:
Version Management in the STAR MLS Database System. DBSec 1998: 159-171 - Jérôme Carrère, Frédéric Cuppens, Claire Saurel:
SACADDOS: A Support Tool to Manage Multilevel Documents. DBSec 1998: 173-188
Role-based Access Controls
- Wolfgang Eßmayr, Elisabeth Kapsammer, Roland R. Wagner, A Min Tjoa:
Using Role-Templates for Handling Recurring Role Structures. DBSec 1998: 191-204 - Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting:
Role Based Security and Java. DBSec 1998: 205-219
Mobile Databases
- Astrid Lubinski:
Security Issues in Mobile Database Access. DBSec 1998: 223-234
Inference
- Liwu Chang, Ira S. Moskowitz:
Bayesian Methods to the Database Inference Problem. DBSec 1998: 237-251 - Raymond W. Yip, Karl N. Levitt:
The Design and Implementation of a Data Level Database Inference Detection System. DBSec 1998: 253-266
Panel
- Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284
Discussion Summary
- Vijayalakshmi Atluri, David L. Spooner:
Workshop Summary. DBSec 1998: 287-293
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.