-
2
-
-
0342296056
-
Secure mediation: Requirements and design
-
Sushil Jajodia (Ed.), Kluwer
-
J. Biskup, U. Flegel, and Y. Karabulut, "Secure mediation: Requirements and design," in Database Security XII: Status and Prospects, Sushil Jajodia (Ed.), Kluwer, 1999.
-
(1999)
Database Security XII: Status and Prospects
, vol.12
-
-
Biskup, J.1
Flegel, U.2
Karabulut, Y.3
-
3
-
-
21444433763
-
Merging heterogeneous security orderings
-
Rome, Italy, September
-
P. Bonatti, M.L. Sapino, and V.S. Subrahmanian, "Merging heterogeneous security orderings," in Proc. 4th European Symp. on Research in Computer Security (ESORICS 96), Rome, Italy, September 1996.
-
(1996)
Proc. 4th European Symp. on Research in Computer Security (ESORICS 96)
-
-
Bonatti, P.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
4
-
-
0029760798
-
Secure mediated databases
-
New Orleans, Lousiana, February
-
K.S. Candan, S. Jajodia, and V.S. Subrahmanian, "Secure mediated databases," in Proc. 12th International Conference on Data Engineering (ICDE '96) New Orleans, Lousiana, February 1996.
-
(1996)
Proc. 12th International Conference on Data Engineering (ICDE '96)
-
-
Candan, K.S.1
Jajodia, S.2
Subrahmanian, V.S.3
-
6
-
-
0343600973
-
-
Technical Report, SRI International
-
S. Dawson, J. Gryz, and X. Qian, "Query folding with functional dependencies," Technical Report, SRI International, 1996.
-
(1996)
Query Folding with Functional Dependencies
-
-
Dawson, S.1
Gryz, J.2
Qian, X.3
-
7
-
-
0342296054
-
Query mediation for trusted database interoperation
-
San Diego, CA, September
-
S. Dawson and X. Qian, "Query mediation for trusted database interoperation," in Proc. 1997 DoD Database Colloquium, San Diego, CA, September 1997.
-
(1997)
Proc. 1997 DoD Database Colloquium
-
-
Dawson, S.1
Qian, X.2
-
8
-
-
57949114471
-
Secure interoperation of heterogeneous systems: A mediator-based approach
-
Vienna-Budapest, 31 August-2 September
-
S. Dawson, S. Qian, and P. Samarati, "Secure interoperation of heterogeneous systems: A mediator-based approach," in Proc. of the IFIP 14th International Conference on Information Security (SEC'98), Vienna-Budapest, 31 August-2 September, 1998.
-
(1998)
Proc. of the IFIP 14th International Conference on Information Security (SEC'98)
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
9
-
-
84910700668
-
-
Technical Report, SRI International, July
-
D.E. Denning, T.F. Lunt, R. Schell, M. Heckman, and S. Shockley, "Secure distributed data view (SeaView) -the SeaView formal security policy model," Technical Report, SRI International, July 1987.
-
(1987)
Secure Distributed Data View (SeaView) -The SeaView Formal Security Policy Model
-
-
Denning, D.E.1
Lunt, T.F.2
Schell, R.3
Heckman, M.4
Shockley, S.5
-
10
-
-
0031357551
-
Authorization specification and enforcement in federated database systems
-
S. De Capitani di Vimercati and P. Samarati, "Authorization specification and enforcement in federated database systems," Journal of Computer Security, vol. 5, no. 2, pp. 155-188, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.2
, pp. 155-188
-
-
De Capitani Di Vimercati, S.1
Samarati, P.2
-
11
-
-
0010032891
-
Computational issues in secure interoperation
-
January
-
L. Gong and X. Qian, "Computational issues in secure interoperation," IEEE Transactions on Software Engineering, vol. 22, no. 1, pp. 43-52, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
12
-
-
0007932097
-
An approach for building secure database federations
-
Santiago, Chile
-
D. Jonscher and K.R. Dittrich, "An approach for building secure database federations," in Proc. 20th VLDB Conference, Santiago, Chile, 1994.
-
(1994)
Proc. 20th VLDB Conference
-
-
Jonscher, D.1
Dittrich, K.R.2
-
13
-
-
0343600969
-
Argos - A configurable access control subsystem which can propagate access rights
-
Rensselaerville, New York, August
-
D. Jonscher and K.R. Dittrich, "Argos - A configurable access control subsystem which can propagate access rights," in Proc. 9th IFIP Working Conference on Database Security, Rensselaerville, New York, August 1995.
-
(1995)
Proc. 9th IFIP Working Conference on Database Security
-
-
Jonscher, D.1
Dittrich, K.R.2
-
14
-
-
0002988773
-
Querying heterogeneous information sources using source descriptions
-
Mumbay, India, September
-
A.Y. Levy, A. Rajaraman, and J.J. Ordille, "Querying heterogeneous information sources using source descriptions," in Proc. of the 22nd International Conference on Very Large Databases (VLDB'96), Mumbay, India, September 1996, pp. 251-262.
-
(1996)
Proc. of the 22nd International Conference on Very Large Databases (VLDB'96)
, pp. 251-262
-
-
Levy, A.Y.1
Rajaraman, A.2
Ordille, J.J.3
-
15
-
-
0342296052
-
Security issues in federated database systems: Panel contributions
-
C. E. Landwehr and S. Jajodia (Eds.), IFIP, Shepherds Town, West Virginia
-
M. Morgenstern, T.F. Lunt, B. Thuraisingham, and D.L. Spooner. Security issues in federated database systems: Panel contributions, in Database Security, V: Status and Prospects, C. E. Landwehr and S. Jajodia (Eds.), IFIP, Shepherds Town, West Virginia, 1992, pp. 131-148.
-
(1992)
Database Security, V: Status and Prospects
, pp. 131-148
-
-
Morgenstern, M.1
Lunt, T.F.2
Thuraisingham, B.3
Spooner, D.L.4
-
16
-
-
8444245802
-
A multilevel secure federated database
-
Rensselaerville, New York, August
-
M.S. Olivier, "A multilevel secure federated database," in Proc. 9th IFIP Working Conference on Database Security, Rensselaerville, New York, August 1995, pp. 23-38.
-
(1995)
Proc. 9th IFIP Working Conference on Database Security
, pp. 23-38
-
-
Olivier, M.S.1
-
17
-
-
0002441509
-
Object fusion in mediator systems
-
Mumbay, India, September
-
Y. Papakostantantinou, S. Abiteboul, and H. Garcia-Molina, "Object fusion in mediator systems," in Proc. 22nd International Conference on Very Large Databases (VLDB'96), Mumbay, India, September 1996.
-
(1996)
Proc. 22nd International Conference on Very Large Databases (VLDB'96)
-
-
Papakostantantinou, Y.1
Abiteboul, S.2
Garcia-Molina, H.3
-
20
-
-
0025489261
-
Federated database systems for managing distributed, heterogeneous, and autonomous databases
-
A.P. Sheth and J. A. Larson, "Federated database systems for managing distributed, heterogeneous, and autonomous databases," ACM Computing Surveys, vol. 22, no. 3, 1990, pp. 183-236.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.3
, pp. 183-236
-
-
Sheth, A.P.1
Larson, J.A.2
-
21
-
-
0342296051
-
Multilevel security issues in distributed database management systems III
-
B. Thuraisingham and H.H. Rubinovitz, "Multilevel security issues in distributed database management systems III," Computers & Security, vol. 11, pp. 661-674, 1992.
-
(1992)
Computers & Security
, vol.11
, pp. 661-674
-
-
Thuraisingham, B.1
Rubinovitz, H.H.2
-
23
-
-
0026836188
-
Mediators in the architecture of future information systems
-
March
-
G. Wiederhold, "Mediators in the architecture of future information systems," IEEE Computer, vol. 25, no. 3, March 1992, pp. 38-49.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 38-49
-
-
Wiederhold, G.1
-
24
-
-
0002851150
-
Web implementation of a security mediator for medical databases
-
T.Y. Lin and S. Qian (Eds.), Chapman & Hall
-
G. Wiederhold, M. Bilello, and C. Donahue, "Web implementation of a security mediator for medical databases," in Database Security XI: Status and Prospects, T.Y. Lin and S. Qian (Eds.), Chapman & Hall, 1998, pp. 60-72.
-
(1998)
Database Security XI: Status and Prospects
, pp. 60-72
-
-
Wiederhold, G.1
Bilello, M.2
Donahue, C.3
-
25
-
-
0030347009
-
A security mediator for health care information
-
Proc. 1996 AMIA Conference, Washington, DC, October
-
G. Wiederhold, M. Bilello, V. Sarathy, and X. Qian, "A security mediator for health care information," in Proc. 1996 AMIA Conference, Journal of the AMIA, Washington, DC, October 1998, pp. 120-124.
-
(1998)
Journal of the AMIA
, pp. 120-124
-
-
Wiederhold, G.1
Bilello, M.2
Sarathy, V.3
Qian, X.4
-
26
-
-
0031338080
-
Using digital credentials on the world wide web
-
M. Winslett, N. Ching, V. Jones, and Slepchin, "Using digital credentials on the world wide web," Journal of Computer Security, vol. 5, no. 3, pp. 255-267, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.3
, pp. 255-267
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin4
|