


default search action
9. DBSec 1995: Rensselaerville, New York, USA
- David L. Spooner, Steven A. Demurjian, John E. Dobson:

Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995. IFIP Conference Proceedings 51, Chapman & Hall 1996, ISBN 0-412-72920-2
Oppening Session
- T. C. Ting:

How Secure is Secure: Some Thoughts on Security Metrics. DBSec 1995: 3-7 - John E. Dobson, Mike Martin:

Messages, Communication, Information Security: Protecting the User from the Data. DBSec 1995: 8-23
Federated and Replicated Databases
- Martin S. Olivier:

Self-protecting Objects in a Secure Federated Database. DBSec 1995: 27-42 - Dirk Jonscher, Klaus R. Dittrich:

Argos - A Configurable Access Control System for Interoperable Environments. DBSec 1995: 43-60 - Ira S. Moskowitz, Myong H. Kang:

The Modulated-Input Modulated-Output Model. DBSec 1995: 61-75
Object-Oriented Systems
- Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu:

URBS Enforcement Mechanisms for Object-Oriented Systems. DBSec 1995: 79-94 - Eduardo B. Fernández, Robert B. France, D. Wei:

A Formal Specification of an Authorization Model for Object-Oriented Databases. DBSec 1995: 95-110 - Marvin Schaefer, P. Martel, T. Kanawati, V. Lyons:

Multilevel Data Model for the Trusted ONTOS Prototype. DBSec 1995: 111-126
Mandatory Access Control
- Matunda Nyanchama, Sylvia L. Osborn:

Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144 - Frédéric Cuppens, Alban Gabillon:

Modelling a Multilevel Database with Temporal Downgrading Functionalities. DBSec 1995: 145-164 - Xiaolei Qian, Teresa F. Lunt:

Towards a MAC Policy Framework. DBSec 1995: 165-180
Concurrency Control
- Shankar Pal:

A Locking Protocol for MLS Databases Providing Support For Long Transactions. DBSec 1995: 183-198 - Sang Hyuk Son, Rasikan David, Bhavani Thuraisingham:

An Adaptive Policy for Improved Timeliness in Secure Database Systems. DBSec 1995: 199-214 - Ravi Mukkamala, Sang Hyuk Son:

A Secure Concurrency Control Protocol for Real-Time Databases. DBSec 1995: 215-230 - Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:

Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247
Design and Implementation of Access Controls
- Marvin Schaefer, Gary W. Smith:

Assured Discretionary Access Control for Trusted RDBMS. DBSec 1995: 251-266 - Ralph Holbein, Stephanie Teufel, Kurt Bauknecht:

A Formal Security Design Approach for Information Exchange in Organisations. DBSec 1995: 267-285
Role-Based Access Control and Next Generation Security Models
- Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting:

Panel Discussion: Role-Based Access Control and Next-Generation Security Models. DBSec 1995: 289-298
Inference Detection
- Rae K. Burns:

Inference Analysis During Multilevel Database Design. DBSec 1995: 301-316 - Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi:

A Tool for Inference Detection and Knowledge Discovery in Databases. DBSec 1995: 317-332 - Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:

ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. DBSec 1995: 333-348
Secure Commercial Database Systems
- Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington:

Customer Requirements for Security in Relational Database Management. DBSec 1995: 351-361
Storage Jamming and Wrap-up
- John P. McDermott, David M. Goldschlag:

Storage Jamming. DBSec 1995: 365-381 - John E. Dobson:

Report of Discussion Sessions Following Presentations. DBSec 1995: 382-387
Informal Evening Session: Data Mining
- Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani Thuraisingham:

Security and Data Mining. DBSec 1995: 391-399

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














