1. DBSec 1987: Annapolis, Maryland, USA

Introductory and General

How Should DBMS Security Policy Requirements be Expressed?

Which Threats can Currently be Countered and How?

How Can Secrecy and Integrity Requirements be Resolved?

What Design and Implementation Methods are Best for Security?

How Should DBMS and OS Security Measures be Related?

How Can User Inference be Modeled and Controlled?

How Can Application-Dependent Requirements be Enforced?

How Can Individual Accountability be Provided?

How Can We Know the Controls Implemented Meet the Specifications?

How do Distributed System Architectures Affect Database Security?

Other Topics