14. DBSec 2000: Schoorl / Amsterdam, The Netherlands
- Bhavani M. Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari:
Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000. IFIP Conference Proceedings 201, Kluwer 2001, ISBN 0-7923-7514-9 - Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti:
Author-X: A Java-Based System for XML Data Protection. DBSec 2000: 15-26 - Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy:
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. DBSec 2000: 27-38 - Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati:
XML Access Control Systems: A Component-Based Approach. DBSec 2000: 39-50 - Alexandre Hardy, Martin S. Olivier:
A Configurable Security Architecture Prototype. DBSec 2000: 51-62 - Susan Chapin, Donald B. Faatz, Sushil Jajodia:
Distributed Policies for Data Management - Making Policies Mobile. DBSec 2000: 63-75 - Christian Altenschmidt, Joachim Biskup, Yücel Karabulut:
Security Architecture of the Multimedia Mediator. DBSec 2000: 77-88 - Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi:
Simulation and Analysis of Cryptographic Protocols. DBSec 2000: 89-100 - Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine:
Authentic Third-party Data Publication. DBSec 2000: 101-112 - Daniel Barbará, Rajni Goel, Sushil Jajodia:
Protecting File systems Against Corruption Using Checksums. DBSec 2000: 113-124 - Marta Oliva, Fèlix Saltor:
Integrating Security Policies in Federated Database Systems. DBSec 2000: 135-147 - Martin S. Olivier, Ehud Gudes:
Wrappers - a mechanism to support state-based authorisation in Web applications. DBSec 2000: 149-160 - Liwu Chang, Ira S. Moskowitz:
An Integrated Framework for Database Privacy Protection. DBSec 2000: 161-172 - Christina Yip Chung, Michael Gertz, Karl N. Levitt:
Discovery of Multi-Level Security Policies. DBSec 2000: 173-184 - Adrian Spalka, Armin B. Cremers:
Confidentiality vs. Integrity in Secure Databases. DBSec 2000: 197-208 - Arnon Rosenthal, Edward Sciore:
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. DBSec 2000: 209-220 - John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi:
Language Extensions for Programmable Security. DBSec 2000: 221-232 - Soon Ae Chun, Vijayalakshmi Atluri:
Protecting Privacy from Continuous High-resolution Satellite Surveillance. DBSec 2000: 233-244 - Sylvia L. Osborn:
Database Security Integration using Role-Based Access Control. DBSec 2000: 245-257 - Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr:
Role-Based Security in a Distributed Resource Environment. DBSec 2000: 259-270 - Wouter Teepe, Reind P. van de Riet, Martin S. Olivier:
WorkFlow Analyzed for Security and Privacy in using Databases. DBSec 2000: 271-282 - Jürgen Steger, Holger Günzel, Andreas Bauer:
Identifying Security Holes in OLAP Applications. DBSec 2000: 283-294 - Marc Donner, David Nochin, Dennis E. Shasha, Wendy Walasek:
Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. DBSec 2000: 295-316 - Hasan M. Jamil:
Declarative Semantics of Belief Queries in MLS Deductive Databases. DBSec 2000: 323-328 - James Bret Michael, Leonard T. Gaines:
Trust Management in Distributed Databases. DBSec 2000: 329-337 - Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi:
Conference Key Agreement Protocol Using Oblivious Transfer. DBSec 2000: 347-353 - Sejong Oh, Seog Park:
An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task. DBSec 2000: 355-360 - Keiji Izaki, Katsuya Tanaka, Makoto Takizawa:
Access Control Model in Object-Oriented Systems. DBSec 2000: 361-366