


Остановите войну!
for scientists:


default search action
2. DBSec 1988: Kingston, Ontario, Canada
- Carl E. Landwehr:
Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988. North-Holland 1989, ISBN 0-444-87483-6
Policy and Models
- John E. Dobson, John A. McDermid:
Security Models and Enterprise Models. DBSec 1988: 1-39 - Teresa F. Lunt:
Access Control Policies for Database Systems. DBSec 1988: 41-52 - Nancy R. Jensen:
System Security Officer Functions in the A1 Secure DBMS. DBSec 1988: 53-62 - D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham:
Prototyping as a Research Tool for MLS/DBMS. DBSec 1988: 63-84 - Tsau Young Lin:
A Generalized Information Flow Model and the Role of System Security Officer. DBSec 1988: 85-103
Object-Oriented Data Management Systems
- Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle:
Discretionary Access Control in Structurally Object-Oriented Database Systems. DBSec 1988: 105-121 - Joachim Biskup, Hans-Werner Graf:
Analysis of the Privacy Model for the Information System DORIS. DBSec 1988: 123-140 - David L. Spooner:
The Impact of Inheritance on Security in Object-Oriented Database Systems. DBSec 1988: 141-150
Distributed DBMSs and Tools
- Judith N. Froscher, Catherine A. Meadows:
Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 - Hilary H. Hosmer, Rae K. Burns:
Designing Multilevel Secure Distributed Databases. DBSec 1988: 161-165
MLS Database Design and Implementation
- Gregory S. Hoppenstand, David K. Hsiao:
Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. DBSec 1988: 167-176 - Teresa F. Lunt:
Multilevel Database Systems: Meeting Class A1. DBSec 1988: 177-186 - Cristi Garvey, Nancy R. Jensen, Jackson Wilson:
The Advanced Secure DBMS: Making Secure DBMSs Usable. DBSec 1988: 187-195
Inference and Aggregation
- Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden:
Security by Permission in Databases. DBSec 1988: 197-205 - Ion Tim Ieong, T. C. Ting:
An Analysis of Database Security with Queries for High Order Statistical Information. DBSec 1988: 207-223 - Norman S. Matloff, Patrick Tendick:
The 'Curse of Dimensionality' in Database Security. DBSec 1988: 225-232 - Ronda R. Henning, Richard P. Simonian:
Security Analysis of database Schema Information. DBSec 1988: 233-245 - Thomas H. Hinke:
Database Inference Engine Design Approach. DBSec 1988: 247-262
Summary of Proceedings
- D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr:
Discussion Notes and Research Question List. DBSec 1988: 263-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.