Sciweavers

10 search results - page 1 / 2
» dbsec 2000
Sort
View
DBSEC
2000
89views Database» more  DBSEC 2000»
13 years 6 months ago
WorkFlow Analyzed for Security and Privacy in using Databases
Wouter Teepe, Reind P. van de Riet, Martin S. Oliv...
DBSEC
2000
111views Database» more  DBSEC 2000»
13 years 6 months ago
Authentic Third-party Data Publication
Premkumar T. Devanbu, Michael Gertz, Charles U. Ma...
DBSEC
2000
117views Database» more  DBSEC 2000»
13 years 6 months ago
Database Security 2000
Database systems are being more and more used, with larger sized databases, and as components of very complex systems, that include numerous protocols. Database security problems ...
John R. Campbell
DBSEC
2000
102views Database» more  DBSEC 2000»
13 years 6 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 6 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes