Sciweavers

DBSEC
2000
89views Database» more  DBSEC 2000»
13 years 6 months ago
WorkFlow Analyzed for Security and Privacy in using Databases
Wouter Teepe, Reind P. van de Riet, Martin S. Oliv...
DBSEC
2000
102views Database» more  DBSEC 2000»
13 years 6 months ago
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges
We propose two extensions to the SQL grant/revoke security model. In SQL, grants are unconditional, so the grantor must simply trust the recipient's discretion. We allow a gr...
Arnon Rosenthal, Edward Sciore
DBSEC
2000
94views Database» more  DBSEC 2000»
13 years 6 months ago
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
In this paper, we present a fair-exchange electronic commerce (e-commerce) protocol, based on using an online trusted third party, that ensures fairness and prevents any party fro...
Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamu...
DBSEC
2000
95views Database» more  DBSEC 2000»
13 years 6 months ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
DBSEC
2000
112views Database» more  DBSEC 2000»
13 years 6 months ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 6 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
DBSEC
2000
138views Database» more  DBSEC 2000»
13 years 6 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
DBSEC
2000
153views Database» more  DBSEC 2000»
13 years 6 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
DBSEC
2000
117views Database» more  DBSEC 2000»
13 years 6 months ago
Database Security 2000
Database systems are being more and more used, with larger sized databases, and as components of very complex systems, that include numerous protocols. Database security problems ...
John R. Campbell
DBSEC
2000
111views Database» more  DBSEC 2000»
13 years 6 months ago
Authentic Third-party Data Publication
Premkumar T. Devanbu, Michael Gertz, Charles U. Ma...