default search action
6. DBSec 1992: Vancouver, British Columbia, Canada
- Bhavani Thuraisingham, Carl E. Landwehr:
Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992. IFIP Transactions A-21, North-Holland 1993, ISBN 0-444-89889-1
Keynote Address
- Jeffrey G. Kaplan:
Protecting Sensitive Medical Information. DBSec 1992: 1-14
Semantic Data Models and Multilevel Security
- Roshan K. Thomas, Ravi S. Sandhu:
Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. DBSec 1992: 15-34 - Kenneth P. Smith, Marianne Winslett:
Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models. DBSec 1992: 35-54
Multilevel Database Applications
- Peter J. Sell:
The SPEAR Data Design Method. DBSec 1992: 55-72 - Simon R. Wiseman:
Using SWORD for the Military Aircraft Command Example Database. DBSec 1992: 73-90
Policies and Models - I
- Dirk Jonscher:
Extending Access Control with Duties - Realized by Active Mechanisms. DBSec 1992: 91-112 - Philip Morris, John A. McDermid:
Formalizing and Validating Complex Security Requirements. DBSec 1992: 113-124 - Gerhard Steinke, Matthias Jarke:
Support for Security Modeling in Information Systems Design. DBSec 1992: 125-142
Secure Distributed Database Systems
- Catherine D. McCollum:
Panel Discussion: Security for Distributed Database Management Systems. DBSec 1992: 143-148
Inference Problem - I
- Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel:
Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. DBSec 1992: 149-168 - Leonard J. Binns:
Inference and Cover Stories. DBSec 1992: 169-178
Inference Problem - II
- Thomas H. Hinke, Harry S. Delugach:
Aerie: An Inference Modeling and Detection Approach for Databases. DBSec 1992: 179-194 - Leonard J. Binns:
Inference Through Secondary Path Analysis. DBSec 1992: 195-210 - George T. Duncan, Sumitra Mukherjee:
Disclosure Limitation using Autocorrelated Noise. DBSec 1992: 211-224
Concurrency Control - I
- Iwen E. Kang, Thomas F. Keefe:
Recovery Management for Multilevel Secure Database Systems. DBSec 1992: 225-248 - Oliver Costich, Sushil Jajodia:
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. DBSec 1992: 249-266
Concurrency Control - II
- John P. McDermott, Sushil Jajodia:
Orange Locking: Channel-Free Database Concurrency Control Via Locking. DBSec 1992: 267-284 - Myong H. Kang, Oliver Costich, Judith N. Froscher:
A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. DBSec 1992: 285-300
Multilevel Data Models
- Xiaolei Qian, Teresa F. Lunt:
Tuple-level vs Element-level Classification. DBSec 1992: 301-316 - Tsau Young Lin:
Inference Secure Multilevel Databases. DBSec 1992: 317-332
Policies and Models - II
- M.-Y. Hu, Steven A. Demurjian, T. C. Ting:
User-Role Based Security Profiles for an Object-Oriented Design Model. DBSec 1992: 333-348 - Jarrellann Filsinger:
Integrity and the Audit of Trusted Database Management Systems. DBSec 1992: 349-366 - James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li:
On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. DBSec 1992: 367-386
Discussion Summary
- Teresa F. Lunt:
Workshop Summary. DBSec 1992: 387-396
Research Question List
- Carl E. Landwehr:
IFIP WG 11.3 Database Security: Research Questions of Current Significance. DBSec 1992: 397-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.