Sciweavers

2386 search results - page 37 / 478
» Database Security 2000
Sort
View
ACIIDS
2010
IEEE
120views Database» more  ACIIDS 2010»
14 years 10 months ago
How to Construct State Registries-Matching Undeniability with Public Security
Przemyslaw Kubiak, Miroslaw Kutylowski, Jun Shao
105
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
14 years 11 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
ESORICS
1998
Springer
15 years 1 months ago
Rules for Designing Multilevel Object-Oriented Databases
When implementing a multilevel security policy for Object-Oriented Databases (OODBs), several aspects have to be investigated. One of these aspect is the design of multilevel OODB...
Frédéric Cuppens, Alban Gabillon
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
15 years 11 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
SP
1997
IEEE
114views Security Privacy» more  SP 1997»
15 years 1 months ago
Surviving information warfare attacks on databases
Paul Ammann, Sushil Jajodia, Catherine D. McCollum...