IEEE Transactions on Software Engineering
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
A note on the confinement problem
Communications of the ACM
Cryptography and data security
Cryptography and data security
A Model of Authorization for Object-Oriented and Semantic Databases
EDBT '88 Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology
Current status of R&D in trusted database management systems
ACM SIGMOD Record
Formal query languages for secure relational databases
ACM Transactions on Database Systems (TODS)
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Joining relations in the belief-consistent multilevel secure relational model
ACM-SE 36 Proceedings of the 36th annual Southeast regional conference
Formal semantics of confidentiality in multilevel logic databases
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
The multilevel relational (MLR) data model
ACM Transactions on Information and System Security (TISSEC)
Minimal data upgrading to prevent inference and association attacks
PODS '99 Proceedings of the eighteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Belief reasoning in MLS deductive databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
A security paradigm for Web databases
ACM-SE 37 Proceedings of the 37th annual Southeast regional conference (CD-ROM)
Controlling Aggregation in Distributed Object Systems: A Graph-Based Approach
IEEE Transactions on Parallel and Distributed Systems
A Semantic Framework of the Multilevel Secure Relational Model
IEEE Transactions on Knowledge and Data Engineering
A Model Theoretic Semantics for Multi-level Secure Deductive Databases
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
Entity Modeling in the MLS Relational Model
VLDB '92 Proceedings of the 18th International Conference on Very Large Data Bases
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Closing the key loophole in MLS databases
ACM SIGMOD Record
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Databases, but not as we know them
ADC '04 Proceedings of the 15th Australasian database conference - Volume 27
Multilevel security: privacy by design
Crossroads
An introduction to multilevel secure relational database management systems
CASCON '04 Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
On logical foundations of multilevel secure databases
Journal of Intelligent Information Systems - Special issue: Database and applications security
Meta-data indexing for XPath location steps
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Mining multiple private databases using a kNN classifier
Proceedings of the 2007 ACM symposium on Applied computing
Preserving data privacy in outsourcing data aggregation services
ACM Transactions on Internet Technology (TOIT) - Special Issue on the Internet and Outsourcing
International Journal of Electronic Commerce
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A multi-purpose implementation of mandatory access control in relational database management systems
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Enabling policy-based access control in BI applications
Data & Knowledge Engineering
Controlled Query Evaluation and Inference-Free View Updates
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Maintaining control while delegating trust: Integrity constraints in trust management
ACM Transactions on Information and System Security (TISSEC)
Multilevel secure rules and its impact on the design of active database systems
BNCOD'03 Proceedings of the 20th British national conference on Databases
Requirements and protocols for inference-proof interactions in information systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Toward MLS database system with write downs
ACACOS'10 Proceedings of the 9th WSEAS international conference on Applied computer and applied computational science
Privacy-aware access control with generalization boundaries
ACSC '09 Proceedings of the Thirty-Second Australasian Conference on Computer Science - Volume 91
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A conditional purpose-based access control model with dynamic roles
Expert Systems with Applications: An International Journal
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Secure model management operations for the web
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Towards an anti-inference (k, ℓ)-anonymity model with value association rules
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Event detection in multilevel secure active databases
ICISS'05 Proceedings of the First international conference on Information Systems Security
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
A role-involved purpose-based access control model
Information Systems Frontiers
From MDM to DB2: a case study of security enforcement migration
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
BTA: architecture for reusable business tier components with access control
ICCSA'12 Proceedings of the 12th international conference on Computational Science and Its Applications - Volume Part III
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |