


default search action
1. DBSec 1987: Annapolis, Maryland, USA
- Carl E. Landwehr:

Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987. North-Holland 1988, ISBN 0-444-70479-5
Introductory and General
- Carl E. Landwehr:

Database Security: Where are We? DBSec 1987: 1-9 - John E. Dobson:

Security and Databases: A Personal View. DBSec 1987: 11-21 - Frank Manola:

A Personal View of DBMS Security. DBSec 1987: 23-34 - Dorothy E. Denning:

Lessons Learned from Modeling a Secure Multilevel Relational Database System. DBSec 1987: 35-43
How Should DBMS Security Policy Requirements be Expressed?
- J. Thomas Haigh:

Modeling Datbase Security Requirements. DBSec 1987: 45-56
Which Threats can Currently be Countered and How?
- Thomas H. Hinke:

DBMS Technology vs. Threats. DBSec 1987: 57-87
How Can Secrecy and Integrity Requirements be Resolved?
- Catherine Meadows, Sushil Jajodia:

Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101
What Design and Implementation Methods are Best for Security?
- Maria Grazia Fugini:

Secure Database Development Methodologies. DBSec 1987: 103-129
How Should DBMS and OS Security Measures be Related?
- Ronda R. Henning:

The Allocation of Database Management System Security Responsibilities. DBSec 1987: 131-148 - David L. Spooner:

Relationships between database System and Operating System Security. DBSec 1987: 149-158
How Can User Inference be Modeled and Controlled?
- Norman S. Matloff:

Inference Control Via Query Restriction Vs. Data Modification: A Perspective. DBSec 1987: 159-166 - Lawrence H. Cox:

Modelling and Controlling User Inference. DBSec 1987: 167-171
How Can Application-Dependent Requirements be Enforced?
- Joachim Biskup:

Privacy Respecting Permissions and Rights. DBSec 1987: 173-185 - T. C. Ting:

A User-Role Based Data Security Approach. DBSec 1987: 187-208 - Frederick H. Lochovsky, Carson C. Woo:

Role-Based Security in Data Base Management Systems. DBSec 1987: 209-222
How Can Individual Accountability be Provided?
- David A. Bonyun:

Logging and Accountability in Database Management Systems. DBSec 1987: 223-227
How Can We Know the Controls Implemented Meet the Specifications?
- Richard A. Kemmerer:

Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240 - Rae K. Burns:

Operational Assurance for a Trusted DBMS. DBSec 1987: 241-251
How do Distributed System Architectures Affect Database Security?
- Glenn H. MacEwen:

Effects of Distributed System Technology on Database Security: A Survey. DBSec 1987: 253-261
Other Topics
- Michael W. Hale:

Status of Trusted DBMS Implementations. DBSec 1987: 263-268 - David K. Hsiao:

Database Security Course Module. DBSec 1987: 269-301 - David K. Hsiao:

Discussion Notes and Revised Question List. DBSec 1987: 303-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














