BibTeX records: Donald B. Faatz

download as .bib file

@article{DBLP:journals/neuroimage/SmithJSHHFC04,
  author       = {Kenneth P. Smith and
                  Sushil Jajodia and
                  Vipin Swarup and
                  Jeffrey Hoyt and
                  Gail Hamilton and
                  Donald B. Faatz and
                  Todd Cornett},
  title        = {Enabling the sharing of neuroimaging data through well-defined intermediate
                  levels of visibility},
  journal      = {NeuroImage},
  volume       = {22},
  number       = {4},
  pages        = {1646--1656},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.neuroimage.2004.03.048},
  doi          = {10.1016/J.NEUROIMAGE.2004.03.048},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neuroimage/SmithJSHHFC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BrennanRFZ04,
  author       = {J. J. Brennan and
                  Mindy Rudell and
                  Donald B. Faatz and
                  Carson Zimmerman},
  title        = {Visualizing Enterprise-Wide Security {(VIEWS)}},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {71--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.49},
  doi          = {10.1109/CSAC.2004.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BrennanRFZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/SmithSJFCH03,
  author       = {Kenneth P. Smith and
                  Vipin Swarup and
                  Sushil Jajodia and
                  Donald B. Faatz and
                  Todd Cornett and
                  Jeffrey Hoyt},
  title        = {Securely sharing neuroimagery},
  booktitle    = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information
                  and Knowledge Management, New Orleans, Louisiana, USA, November 2-8,
                  2003},
  pages        = {375--377},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/956863.956934},
  doi          = {10.1145/956863.956934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/SmithSJFCH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ChapinFJF02,
  author       = {Susan Chapin and
                  Donald B. Faatz and
                  Sushil Jajodia and
                  Amgad Fayad},
  title        = {Consistent policy enforcement in distributed systems using mobile
                  policies},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {261--280},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00128-3},
  doi          = {10.1016/S0169-023X(02)00128-3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SmithFFJ02,
  author       = {Kenneth P. Smith and
                  Donald B. Faatz and
                  Amgad Fayad and
                  Sushil Jajodia},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Propagating Modifications to Mobile Policies},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {573--584},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 29 Aug 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SmithFFJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FayadJFD01,
  author       = {Amgad Fayad and
                  Sushil Jajodia and
                  Donald B. Faatz and
                  Vinti Doshi},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Going Beyond {MAC} and {DAC} Using Mobile Policies},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {245--260},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FayadJFD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/BainFFW01,
  author       = {Charles Bain and
                  Donald B. Faatz and
                  Amgad Fayad and
                  Douglas E. Williams},
  editor       = {Michael Gertz and
                  Erik Guldentops and
                  Leon Strous},
  title        = {Diversity as a defense strategy in information systems. Does evidence
                  from previous events support such an approach?},
  booktitle    = {Integrity, Internal Control and Security in Information Systems: Connecting
                  Governance and Technology, {IFIP} {TC11/WG11.5} Fourth Working Conference
                  on Integrity, Internal Control and Security in Information Systems,
                  November 15-16, 2001, Brussels, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {211},
  pages        = {77--94},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Mon, 07 Dec 2020 17:16:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tc11-5/BainFFW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChapinFJ00,
  author       = {Susan Chapin and
                  Donald B. Faatz and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Distributed Policies for Data Management - Making Policies Mobile},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {63--75},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_6},
  doi          = {10.1007/0-306-47008-X\_6},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChapinFJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McCollumFHST97,
  author       = {Catherine D. McCollum and
                  Donald B. Faatz and
                  William R. Herndon and
                  E. John Sebes and
                  Roshan K. Thomas},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Distributed Object Technologies, Databases and Security},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {17--31},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 24 Sep 2003 08:16:49 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/McCollumFHST97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FaatzS90,
  author       = {Donald B. Faatz and
                  David L. Spooner},
  editor       = {Sushil Jajodia and
                  Carl E. Landwehr},
  title        = {Discretionary Access Control in Object-Oriented Engineering Database
                  Systems},
  booktitle    = {Database Security, {IV:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21,
                  1990},
  pages        = {73--84},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Wed, 20 Jun 2018 17:22:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FaatzS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/SpoonerMF86,
  author       = {David L. Spooner and
                  Michael A. Milicia and
                  Donald B. Faatz},
  title        = {Modeling Mechanical {CAD} Data with Data Abstraction and Object-Oriented
                  Techniques},
  booktitle    = {Proceedings of the Second International Conference on Data Engineering,
                  February 5-7, 1986, Los Angeles, California, {USA}},
  pages        = {416--424},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  url          = {https://doi.org/10.1109/ICDE.1986.7266248},
  doi          = {10.1109/ICDE.1986.7266248},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/SpoonerMF86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics