


default search action
12. DBSec 1998: Chalkidiki, Greece
- Sushil Jajodia:

Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece. IFIP Conference Proceedings 142, Kluwer 1999, ISBN 0-7923-8488-1
Invited Talks
- Anup K. Ghosh:

E-Commerce Security: No Silver Bullet. DBSec 1998: 3-16 - Joachim Biskup:

Technical Enforcement of Informational Assurances. DBSec 1998: 17-40
Workflow
- Wei-kuang Huang, Vijayalakshmi Atluri:

Analysing the Safety of Workflow Authorization Models. DBSec 1998: 43-57 - Silvana Castano, Maria Grazia Fugini:

Rules and Patterns for Security in Workflow Systems. DBSec 1998: 59-74
Privacy
- Lucas C. J. Dreyer, Martin S. Olivier:

An Information-Flow for Privacy (InfoPriv). DBSec 1998: 77-90
Policy Modeling
- Ehud Gudes, Martin S. Olivier:

Security Policies in Replicated and Autonomous Databases. DBSec 1998: 93-107 - John Hale, Mauricio Papa, Sujeet Shenoi:

Programmable Security for Object-Oriented Systems. DBSec 1998: 109-123
Mediation
- Joachim Biskup, Ulrich Flegel, Yücel Karabulut:

Secure Mediation: Requirements and Design. DBSec 1998: 127-140
Information Warfare Defense
- Brajendra Panda, Joseph Giordano:

Reconstructing the Database after Electronic Attacks. DBSec 1998: 143-156
Multilevel Security
- Ramprasad Sripada, Thomas F. Keefe:

Version Management in the STAR MLS Database System. DBSec 1998: 159-171 - Jérôme Carrère, Frédéric Cuppens, Claire Saurel:

SACADDOS: A Support Tool to Manage Multilevel Documents. DBSec 1998: 173-188
Role-based Access Controls
- Wolfgang Eßmayr, Elisabeth Kapsammer, Roland R. Wagner, A Min Tjoa:

Using Role-Templates for Handling Recurring Role Structures. DBSec 1998: 191-204 - Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting:

Role Based Security and Java. DBSec 1998: 205-219
Mobile Databases
- Astrid Lubinski:

Security Issues in Mobile Database Access. DBSec 1998: 223-234
Inference
- Liwu Chang, Ira S. Moskowitz:

Bayesian Methods to the Database Inference Problem. DBSec 1998: 237-251 - Raymond W. Yip, Karl N. Levitt:

The Design and Implementation of a Data Level Database Inference Detection System. DBSec 1998: 253-266
Panel
- Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier:

Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284
Discussion Summary
- Vijayalakshmi Atluri, David L. Spooner:

Workshop Summary. DBSec 1998: 287-293

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














