default search action
Thomas F. Keefe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2002
- [c22]Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe:
Authorization Model for Summary Schemas Model. IDEAS 2002: 182-191 - [c21]Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe:
Maintaining Consistency of the Security Policy using Timestamp Ordering. ITCC 2002: 164-170 - 2001
- [j7]Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Security Transaction Processing. J. Comput. Secur. 9(3): 165-195 (2001)
1990 – 1999
- 1998
- [c20]Ramprasad Sripada, Thomas F. Keefe:
Version Management in the STAR MLS Database System. DBSec 1998: 159-171 - 1996
- [c19]Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 - [c18]Shang-Sheng Tung, Hongyuan Zha, Thomas F. Keefe:
Indexing Management for Distributed Linear Hash Files. DEXA Workshop 1996: 106-114 - [c17]Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal:
The Impact of Multilevel Security on Database Buffer Management. ESORICS 1996: 266-289 - [c16]Thomas F. Keefe, Wei-Tek Tsai:
A multiversion transaction scheduler for centralized multilevel secure database systems. HASE 1996: 206-213 - 1995
- [j6]Iwen E. Kang, Thomas F. Keefe:
Transaction Management for Multilevel Secure Replicated Databases. J. Comput. Secur. 3(2/3): 115-146 (1995) - [j5]Sourav Bhattacharya, Thomas F. Keefe, Wei-Tek Tsai:
Covert Channel Secure Hypercube Message Communication. J. Parallel Distributed Comput. 26(2): 233-247 (1995) - [c15]Iwen E. Kang, Thomas F. Keefe:
Concurrency control for federated multilevel secure database systems. CSFW 1995: 118-135 - [c14]Andrew Warner, Thomas F. Keefe:
Version pool management in a multilevel secure multiversion transaction manager. S&P 1995: 169-182 - 1994
- [e1]Thomas F. Keefe, Carl E. Landwehr:
Database Security, VII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993. IFIP Transactions A-47, North-Holland 1994, ISBN 0-444-81833-2 [contents] - 1993
- [j4]Thomas F. Keefe, Wei-Tek Tsai, Jaideep Srivastava:
Database Concurrency Control in Multilevel Secure Database Management Systems. IEEE Trans. Knowl. Data Eng. 5(6): 1039-1055 (1993) - [c13]Amit G. Mathur, Thomas F. Keefe:
The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS System. CSFW 1993: 10-23 - [c12]Iwen E. Kang, Thomas F. Keefe:
Supporting Reliable and Atomic Transaction Management in Multidatabase Systems. ICDCS 1993: 457-464 - [c11]Thomas F. Keefe:
Reconciling Objects and Multilevel Security (Panel). OOPSLA 1993: 308 - [c10]Bhavani Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe:
Integrating security technology and object-oriented technology (panel). OOPSLA Addendum 1993: 59-61 - 1992
- [c9]Iwen E. Kang, Thomas F. Keefe:
Recovery Management for Multilevel Secure Database Systems. DBSec 1992: 225-248 - [c8]Iwen E. Kang, Thomas F. Keefe:
On Transaction Processing for Multilevel Secure Replicated Databases. ESORICS 1992: 329-348 - 1991
- [c7]Thomas F. Keefe:
SODA: a security model for object-oriented database management systems. COMPSAC 1991: 699-704 - 1990
- [j3]Wei-Tek Tsai, Dmitry Volovik, Thomas F. Keefe:
Automated Test Case Generation for Programs Specified by Relational Algebra Queries. IEEE Trans. Software Eng. 16(3): 316-324 (1990) - [c6]Thomas F. Keefe, Wei-Tek Tsai, Jaideep Srivastava:
Multilevel Secure Database Concurrency Control. ICDE 1990: 337-344 - [c5]Thomas F. Keefe, Wei-Tek Tsai:
Multiversion Concurrency Control for Multilevel Secure Database Systems. S&P 1990: 369-383
1980 – 1989
- 1989
- [j2]Thomas F. Keefe, Wei-Tek Tsai, Bhavani M. Thuraisingham:
SODA: A secure object-oriented database system. Comput. Secur. 8(6): 517-533 (1989) - [j1]Thomas F. Keefe, Bhavani M. Thuraisingham, Wei-Tek Tsai:
Secure Query-Processing Strategies. Computer 22(3): 63-70 (1989) - [c4]Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch:
Multi-party conflict: the problem and its solutions. ACSAC 1989: 222-231 - [c3]Thomas F. Keefe, Wei-Tek Tsai:
Security model consistency in secure object-oriented systems. ACSAC 1989: 290-298 - [c2]Thomas F. Keefe, Wei-Tek Tsai:
Prototyping the SODA Model. DBSec 1989: 211-235 - 1988
- [c1]Wei-Tek Tsai, Dmitry Volovik, Thomas F. Keefe, Mohamed E. Fayad:
Automatic test case generation from relational algebra queries. COMPSAC 1988: 252-258
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint