


default search action
15. DBSec 2001: Niagara on the Lake, Ontario, Canada
- Martin S. Olivier, David L. Spooner:

Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada. IFIP Conference Proceedings 215, Kluwer 2002, ISBN 1-4020-7041-1
Keynote address
- Sushil Jajodia, Duminda Wijesekera:

Recent Advances in Access Control Models. DBSec 2001: 3-15
Role and Constraint-Based Access Control
- Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu:

Role-based Access Control on the Web Using LDAP. DBSec 2001: 19-30 - Wee-Yeh Tan:

Constraints-based Access Control. DBSec 2001: 31-44 - Savith Kandala, Ravi S. Sandhu:

Secure Role-Based Workflow Models. DBSec 2001: 45-58
Distributed Systems
- Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia:

Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 - Liu Peng, Hao Xu:

Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. DBSec 2001: 75-89 - Arnon Rosenthal, Edward Sciore:

Administering Permissions for Distributed Data: Factoring and Automated Inference. DBSec 2001: 91-104 - Joachim Biskup, Thomas Leineweber:

State-Dependent Security Decisions for Distributed Object-Systems. DBSec 2001: 105-118
Information Warfare and Intrusion Detection
- Rumman Sobhan, Brajendra Panda:

Reorganization of Database Log for Information Warfare Data Recovery. DBSec 2001: 121-134 - Ira S. Moskowitz, Myong H. Kang, Liwu Chang, Garth E. Longdon:

Randomly roving agents for intrusion detection. DBSec 2001: 135-149 - G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi:

Public Telephone Network Vulnerabilities. DBSec 2001: 151-164
Relational Databases
- Steve Barker, Arnon Rosenthal:

Flexible Security Policies in SQL. DBSec 2001: 167-180 - Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman:

The Inference Problem and Updates in Relational Databases. DBSec 2001: 181-194 - Adrian Spalka:

Managing Classified Documents in a Relational Database. DBSec 2001: 195-208
Implementation Issues
- Alexandre Hardy, Martin S. Olivier:

A Comparison Between ConSA and Current Linux Security Implementations. DBSec 2001: 211-224 - Ravi Mukkamala, Sushil Jajodia:

A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238 - Pramote Luenam, Peng Liu:

ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. DBSec 2001: 239-252
Multilevel Systems
- Vijayalakshmi Atluri, Ravi Mukkamala:

An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. DBSec 2001: 255-268 - Marta Oliva, Fèlix Saltor:

Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System. DBSec 2001: 269-282
New Application Areas
- Tom Johnsten, Vijay V. Raghavan:

Security Procedures for Classification Mining Algorithms. DBSec 2001: 285-297 - Alban Gabillon, Emmanuel Bruno:

Regulating Access to XML documents. DBSec 2001: 299-314
Panel and discussion
- Sylvia L. Osborn, Bhavani Thuraisingham, Pierangela Samarati:

Panel on XML and Security. DBSec 2001: 317-323 - David L. Spooner, Martin S. Olivier:

Selected Summary of Discussions. DBSec 2001: 325-335

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














