A formal approach to undo operations in programming languages
ACM Transactions on Programming Languages and Systems (TOPLAS) - The MIT Press scientific computation series
A second course in database management
SIGCSE '86 Proceedings of the seventeenth SIGCSE technical symposium on Computer science education
ACM SIGSAC Review
Resolving the tension between integrity and security using a theorem prover
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Protecting statistical databases: a matter of privacy
ACM SIGCAS Computers and Society
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
ACM SIGMOD Record - Directions for future database research & development
Current status of R&D in trusted database management systems
ACM SIGMOD Record
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
A model of integrity for object-oriented database systems
SAC '92 Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's
A decompositional approach to database constraint enforcement
CSC '93 Proceedings of the 1993 ACM conference on Computer science
A mathematical framework to implement statistical databases
ACM SIGSAC Review
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
Replicating and allocating data in a distributed database system for workstations
Proceedings of the 1985 ACM SIGSMALL symposium on Small systems
Designing organizational interfaces
CHI '85 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The integrity subsystem of a distributed database system for workstations
CSC '85 Proceedings of the 1985 ACM thirteenth annual conference on Computer Science
Reflective authorization systems: possibilities, benefits, and drawbacks
Secure Internet programming
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
Authorization and Revocation in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
A Relational Database View Update Translation Mechanism
VLDB '84 Proceedings of the 10th International Conference on Very Large Data Bases
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Modern trends in authentication
ACM SIGSAC Review - Resources: part II
Patterns for session-based access control
Proceedings of the 2006 conference on Pattern languages of programs
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Impacts of information system vulnerabilities on society
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
An overview of computer security
IBM Systems Journal
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Software—Practice & Experience - Focus on Selected PhD Literature Reviews in the Practical Aspects of Software Technology
Supporting multiple access control policies in database systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Implementing commercial data integrity with secure capabilities
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Efficient key updates in encrypted database systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |