Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Donald B. Faatz
@article{DBLP:journals/neuroimage/SmithJSHHFC04, author = {Kenneth P. Smith and Sushil Jajodia and Vipin Swarup and Jeffrey Hoyt and Gail Hamilton and Donald B. Faatz and Todd Cornett}, title = {Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility}, journal = {NeuroImage}, volume = {22}, number = {4}, pages = {1646--1656}, year = {2004}, url = {https://doi.org/10.1016/j.neuroimage.2004.03.048}, doi = {10.1016/J.NEUROIMAGE.2004.03.048}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/SmithJSHHFC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BrennanRFZ04, author = {J. J. Brennan and Mindy Rudell and Donald B. Faatz and Carson Zimmerman}, title = {Visualizing Enterprise-Wide Security {(VIEWS)}}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {71--79}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.49}, doi = {10.1109/CSAC.2004.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BrennanRFZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/SmithSJFCH03, author = {Kenneth P. Smith and Vipin Swarup and Sushil Jajodia and Donald B. Faatz and Todd Cornett and Jeffrey Hoyt}, title = {Securely sharing neuroimagery}, booktitle = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information and Knowledge Management, New Orleans, Louisiana, USA, November 2-8, 2003}, pages = {375--377}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/956863.956934}, doi = {10.1145/956863.956934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/SmithSJFCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ChapinFJF02, author = {Susan Chapin and Donald B. Faatz and Sushil Jajodia and Amgad Fayad}, title = {Consistent policy enforcement in distributed systems using mobile policies}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {261--280}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00128-3}, doi = {10.1016/S0169-023X(02)00128-3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SmithFFJ02, author = {Kenneth P. Smith and Donald B. Faatz and Amgad Fayad and Sushil Jajodia}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Propagating Modifications to Mobile Policies}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {573--584}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 29 Aug 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SmithFFJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FayadJFD01, author = {Amgad Fayad and Sushil Jajodia and Donald B. Faatz and Vinti Doshi}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Going Beyond {MAC} and {DAC} Using Mobile Policies}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {245--260}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/FayadJFD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/BainFFW01, author = {Charles Bain and Donald B. Faatz and Amgad Fayad and Douglas E. Williams}, editor = {Michael Gertz and Erik Guldentops and Leon Strous}, title = {Diversity as a defense strategy in information systems. Does evidence from previous events support such an approach?}, booktitle = {Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, {IFIP} {TC11/WG11.5} Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {211}, pages = {77--94}, publisher = {Kluwer}, year = {2001}, timestamp = {Mon, 07 Dec 2020 17:16:29 +0100}, biburl = {https://dblp.org/rec/conf/tc11-5/BainFFW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChapinFJ00, author = {Susan Chapin and Donald B. Faatz and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Distributed Policies for Data Management - Making Policies Mobile}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {63--75}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_6}, doi = {10.1007/0-306-47008-X\_6}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ChapinFJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McCollumFHST97, author = {Catherine D. McCollum and Donald B. Faatz and William R. Herndon and E. John Sebes and Roshan K. Thomas}, editor = {Tsau Young Lin and Shelly Qian}, title = {Distributed Object Technologies, Databases and Security}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {17--31}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 24 Sep 2003 08:16:49 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/McCollumFHST97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FaatzS90, author = {Donald B. Faatz and David L. Spooner}, editor = {Sushil Jajodia and Carl E. Landwehr}, title = {Discretionary Access Control in Object-Oriented Engineering Database Systems}, booktitle = {Database Security, {IV:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990}, pages = {73--84}, publisher = {North-Holland}, year = {1990}, timestamp = {Wed, 20 Jun 2018 17:22:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FaatzS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/SpoonerMF86, author = {David L. Spooner and Michael A. Milicia and Donald B. Faatz}, title = {Modeling Mechanical {CAD} Data with Data Abstraction and Object-Oriented Techniques}, booktitle = {Proceedings of the Second International Conference on Data Engineering, February 5-7, 1986, Los Angeles, California, {USA}}, pages = {416--424}, publisher = {{IEEE} Computer Society}, year = {1986}, url = {https://doi.org/10.1109/ICDE.1986.7266248}, doi = {10.1109/ICDE.1986.7266248}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/SpoonerMF86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.