Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
39 | Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef |
Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. |
J. Cloud Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
39 | Tsau Young Lin, Shelly Qian (eds.) |
Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA |
DBSec |
1998 |
DBLP BibTeX RDF |
|
39 | John P. McDermott |
Replication Does Survive Information Warfare Attacks. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Elisa Bertino, Elena Ferrari |
Administration Policies in a Multipolicy Autorization System. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Kan Zhang |
IRI: A Quantitative Approach to Inference Analysis in Relational Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray |
A Two-tier Coarse Indexing Scheme for MLS Database Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier |
Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi |
Implementing Advanced Internet Search Engines. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Adrian Spalka, Armin B. Cremers |
Structured Name-Spaces in Secure Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Elisa Bertino, Elena Ferrari |
A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton |
Security Issues in Data Warehousing and Data Mining: Panel Discussion. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Gio Wiederhold, Michel Bilello, Chris Donahue |
Web Implementation of a Security Mediator for Medical Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Tsau Young Lin, Xiaoling Zuo |
Multilevel Decision Logic: A Formalism for Rules Mining. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino |
An Execution Model for Multilevel Seccure Workflows. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Ravi S. Sandhu, Venkata Bhamidipati |
The URA97 Model for Role-Based User-Role Assignment. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | John Hale, Jody Threet, Sujeet Shenoi |
Capability-Based Primitives for Access Control in Object-Oriented Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Roshan K. Thomas, Ravi S. Sandhu |
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Zahir Tari |
Designing Security Agents for the DOK Federated System. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Steven A. Demurjian, T. C. Ting, John A. Reisner |
Software Architectural Alternatives for User Role-Based Security Policies. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Sang Hyuk Son, Craig Chaney |
Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas |
Distributed Object Technologies, Databases and Security. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Masha Gendler-Fishman, Ehud Gudes |
Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Wolfgang Eßmayr, Günther Pernul, A Min Tjoa |
Access Controls by Object-Oriented Concepts. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Latanya Sweeney |
Datafly: A System for Providing Anonymity in Medical Data. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Chanjung Park, Seog Park, Sang Hyuk Son |
Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi |
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. |
DBSec |
1997 |
DBLP BibTeX RDF |
|
39 | Reind P. van de Riet, Ehud Gudes |
An Object-Oriented Database Architecture for Providing Securty in Cyberspace. |
DBSec |
1996 |
DBLP BibTeX RDF |
|
39 | S. J. Bruniges |
A Securty Related Architecture for a TNB Supporting Confidentiality and Integrity Based Polices. |
LANSEC |
1989 |
DBLP DOI BibTeX RDF |
|
36 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
33 | David Foster, Vijay Varadharajan |
Security and Trust Enhanced Mobile Agent Based System Design. |
ICITA (1) |
2005 |
DBLP DOI BibTeX RDF |
|