Role-Based Access Control Models
Computer
An object-oriented database architecture for providing security in cyberspace
Proceedings of the tenth annual IFIP TC11/WG11.3 international conference on Database security: volume X : status and prospects: status and prospects
The entity-relationship model—toward a unified view of data
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Theoretical Computer Science
The Integration of Security and Integrity Constraints in MOKUM
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Specifying Application-level Security in Workflow Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Security Moving from Database Systems to ERP Systems
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Workflow analyzed for security and privacy in using databases
Journal of Computer Security - IFIP 2000
Advances in business process management
Data & Knowledge Engineering - Special issue: Advances in business process management
Hi-index | 0.00 |
The refereeing process for the Data & Knowledge Engineering Journal as it is and will be executed in Cyberspace is the subject of this paper, in particular security and privacy aspects. This process can be defined and implemented in the Mokum system; we will show that it complies to the security and privacy rules on three levels: 1. Highest: at the conceptual level. 2. Middle: at the implementational level. 3. Lowest: at the communicational level.