default search action
1. DBSec 1987: Annapolis, Maryland, USA
- Carl E. Landwehr:
Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987. North-Holland 1988, ISBN 0-444-70479-5
Introductory and General
- Carl E. Landwehr:
Database Security: Where are We? DBSec 1987: 1-9 - John E. Dobson:
Security and Databases: A Personal View. DBSec 1987: 11-21 - Frank Manola:
A Personal View of DBMS Security. DBSec 1987: 23-34 - Dorothy E. Denning:
Lessons Learned from Modeling a Secure Multilevel Relational Database System. DBSec 1987: 35-43
How Should DBMS Security Policy Requirements be Expressed?
- J. Thomas Haigh:
Modeling Datbase Security Requirements. DBSec 1987: 45-56
Which Threats can Currently be Countered and How?
- Thomas H. Hinke:
DBMS Technology vs. Threats. DBSec 1987: 57-87
How Can Secrecy and Integrity Requirements be Resolved?
- Catherine Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101
What Design and Implementation Methods are Best for Security?
- Maria Grazia Fugini:
Secure Database Development Methodologies. DBSec 1987: 103-129
How Should DBMS and OS Security Measures be Related?
- Ronda R. Henning:
The Allocation of Database Management System Security Responsibilities. DBSec 1987: 131-148 - David L. Spooner:
Relationships between database System and Operating System Security. DBSec 1987: 149-158
How Can User Inference be Modeled and Controlled?
- Norman S. Matloff:
Inference Control Via Query Restriction Vs. Data Modification: A Perspective. DBSec 1987: 159-166 - Lawrence H. Cox:
Modelling and Controlling User Inference. DBSec 1987: 167-171
How Can Application-Dependent Requirements be Enforced?
- Joachim Biskup:
Privacy Respecting Permissions and Rights. DBSec 1987: 173-185 - T. C. Ting:
A User-Role Based Data Security Approach. DBSec 1987: 187-208 - Frederick H. Lochovsky, Carson C. Woo:
Role-Based Security in Data Base Management Systems. DBSec 1987: 209-222
How Can Individual Accountability be Provided?
- David A. Bonyun:
Logging and Accountability in Database Management Systems. DBSec 1987: 223-227
How Can We Know the Controls Implemented Meet the Specifications?
- Richard A. Kemmerer:
Formal Specification and Verification Techniques for Secure Database Systems. DBSec 1987: 229-240 - Rae K. Burns:
Operational Assurance for a Trusted DBMS. DBSec 1987: 241-251
How do Distributed System Architectures Affect Database Security?
- Glenn H. MacEwen:
Effects of Distributed System Technology on Database Security: A Survey. DBSec 1987: 253-261
Other Topics
- Michael W. Hale:
Status of Trusted DBMS Implementations. DBSec 1987: 263-268 - David K. Hsiao:
Database Security Course Module. DBSec 1987: 269-301 - David K. Hsiao:
Discussion Notes and Revised Question List. DBSec 1987: 303-330
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.