


default search action
4. DBSec 1990: Halifax, U.K.
- Sushil Jajodia, Carl E. Landwehr:

Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990. North-Holland 1991, ISBN 0-444-89076-9
Applications
- Bruce I. Blum:

Computer Security in a Clinical Environment. DBSec 1990: 1-12 - LouAnna Notargiacomo, Richard D. Graubart:

Health Delivery: The Problem solved? DBSec 1990: 13-26 - Richard A. Kemmerer:

A Multilevel Formal Specification of a Mental Health Care Database. DBSec 1990: 27-52
Object_Oriented Systems
- Matthew Morgenstern:

A Security Model for Multilevel Objects with Bidirectional Relationships. DBSec 1990: 53-72 - Donald B. Faatz, David L. Spooner:

Discretionary Access Control in Object-Oriented Engineering Database Systems. DBSec 1990: 73-84 - Ehud Gudes, Haiyan Song, Eduardo B. Fernández:

Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. DBSec 1990: 85-98 - Bhavani Thuraisingham:

Multilevel Security for Multimedia Database Systems. DBSec 1990: 99-116
Policies and Models
- Mike Martin, John E. Dobson:

Enterprise Modeling and Security Policies. DBSec 1990: 117-150 - D. J. Thomsen:

Role-Based Application Design and Enforcement. DBSec 1990: 151-168 - Joachim Biskup:

A General Framework for Database Security (Abstract). DBSec 1990: 169-170 - Marshall D. Abrams, Gary W. Smith:

A Generalized Framework for Database Access Controls. DBSec 1990: 171-178
Integrity
- Ravi S. Sandhu:

Separation of Duties in Computerized Information Systems. DBSec 1990: 179-190 - Simon R. Wiseman:

The Control of Integrity in Databases. DBSec 1990: 191-204 - Edgar H. Sibley, Gary W. Smith:

On the Behavior of Multilevel Database Systems. DBSec 1990: 205-220 - David K. Hsiao, Matthew J. Kohler, Shawn W. Stround:

Query Modifications as a Means of Controlling Access to Multilevel Secure Databases. DBSec 1990: 221-240
Integration of Security Considerations with DBMS Development
- Catherine Meadows:

Policies for Dynamic Upgrading. DBSec 1990: 241-250 - Hilary H. Hosmer:

Shared Sensitivity Labels. DBSec 1990: 251-264
Multilevel Secure Relational Databases
- J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen:

The LDV Secure Relational DBMS Model. DBSec 1990: 265-280 - Teresa F. Lunt, Donovan Hsieh:

Update Semantics for a Multilevel Relational Database System. DBSec 1990: 281-296 - Sushil Jajodia, Ravi S. Sandhu:

Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308
Aggregation and Inference
- Barry Sowerbutts, Shanda Cordingley:

Database Architectonics and Inferential Security. DBSec 1990: 309-325 - Tsau Young Lin:

Multilevel Database and Aggregated Security Algebra. DBSec 1990: 325-350
Past, Present and Future
- Marvin Schaefer:

Reflexions on Current Issues in Trusted DBMS. DBSec 1990: 351-370 - David A. Bonyum:

The Third Stream: Long-Term Prospects for Secure Database Management. DBSec 1990: 371-380 - John R. Campbell:

A Research and Development Program for Trusted Distributed Database Systems. DBSec 1990: 381-394 - Catherine Meadows:

Discussion Summary. DBSec 1990: 395-404 - Carl E. Landwehr:

Research Question List. DBSec 1990: 405-

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














