


default search action
13. DBSec 1999: Seattle, WA, USA
- Vijayalakshmi Atluri, John Hale:

Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA. IFIP Conference Proceedings 171, Kluwer 2000, ISBN 0-7923-7848-2
Intrusion Detection
- Peng Liu, Sushil Jajodia, Catherine D. McCollum:

Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 - Anup K. Ghosh, Aaron Schwartzbard:

Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. DBSec 1999: 19-32 - Ravi Mukkamala, Jason Gagnon, Sushil Jajodia:

Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46
Role-Based Access Control
- Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta:

RBAC on the Web by Secure Cookies. DBSec 1999: 49-62 - Ioannis Mavridis, George Pangalos, Marie Khair:

eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. DBSec 1999: 63-78 - Steven A. Demurjian, Y. He, T. C. Ting, M. Saba:

Software Agents for Role Based Security. DBSec 1999: 79-93
Critical Infrastructure Protection Panel
- William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield:

Selected Topics in Infrastructure and Information Assurance (Panel). DBSec 1999: 97-113
Policy/Modeling
- Andrew Po-Jung Ho:

A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. DBSec 1999: 117-125 - Joachim Biskup:

For Unknown Secrecies Refusal is Better than Lying. DBSec 1999: 127-141
Workflow Systems
- Savith Kandala, Ravi S. Sandhu:

Extending The BFA Workflow Authorization Model to Express Weighted Voting. DBSec 1999: 145-159 - Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz:

A Strategy for an MLS Workflow Management System. DBSec 1999: 161-174
Data Mining/Data Warehousing
- Tom Johnsten, Vijay V. Raghavan:

Impact of Decision-Region Based Classification Mining Algorithms on Database Security. DBSec 1999: 177-191 - Chris Clifton:

Protecting Against Data Mining through Samples. DBSec 1999: 193-207 - Arnon Rosenthal, Edward Sciore, Vinti Doshi:

Security Administration for Federations, Warehouses, and other Derived Data. DBSec 1999: 209-223
Intrusion Detection Panel
- T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin:

Panel on Intrusion Detection. DBSec 1999: 227-234
Multilevel Security
- Donald G. Marks:

Enforcing Integrity While Maintaining Secrecy. DBSec 1999: 237-251 - Adrian Spalka, Armin B. Cremers:

The Effect of Confidentiality on the Structure of Databases. DBSec 1999: 253-268
Temporal Authorization Models
- Steve Barker:

Temporal Authorization in the Simplified Event Calculus. DBSec 1999: 271-284 - Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino:

Specifying and Computing Hierarchies of Temporal Authorizations. DBSec 1999: 285-300
Object-Oriented Databases
- Yasunori Ishihara, Toshiyuki Morita, Minoru Ito:

The Security Problem against Inference Attacks on Object-Oriented Databases. DBSec 1999: 303-316 - Yun Bai, Vijay Varadharajan:

A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. DBSec 1999: 317-330

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














