-
2
-
-
10544247870
-
Design environment for a hospital information system: Meeting the data security challenge
-
K. C. Lun, P. Degoulet, T. E. Piemme and O.'Rienhoff (eds) (Amsterdam: Elsevier Science Publishers B.V. (North-Holland))
-
EICHINGER, S., and PERNUL, G. (1992) Design environment for a hospital information system: meeting the data security challenge. In Medinfo 92, K. C. Lun, P. Degoulet, T. E. Piemme and O.'Rienhoff (eds) (Amsterdam: Elsevier Science Publishers B.V. (North-Holland)), pp. 1582-1588.
-
(1992)
Medinfo 92
, pp. 1582-1588
-
-
Eichinger, S.1
Pernul, G.2
-
3
-
-
10544226285
-
Health delivery: The problem solved?
-
S. Jajodia and C. E. Landwehr (eds), (Amsterdam: North-Holland)
-
NOTARGIACOMO, L., and GRAUBART, D. (1991) Health delivery: the problem solved? In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr (eds), (Amsterdam: North-Holland), pp. 13-26.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 13-26
-
-
Notargiacomo, L.1
Graubart, D.2
-
4
-
-
0013608577
-
Improving the security of medical database systems
-
J. H. P. Eloff and S. H. von Solms (eds) (London: Chapman-Hall)
-
PANGALOS, G., GRITZALIS, D., KHAIR, M., and BOZIOS, L. (1995) Improving the security of medical database systems. In Proceedings of the IFIP TC11 International Conference on Information Security, IFIP/Sec' 95, J. H. P. Eloff and S. H. von Solms (eds) (London: Chapman-Hall), pp. 11-25.
-
(1995)
Proceedings of the IFIP TC11 International Conference on Information Security, IFIP/Sec' 95
, pp. 11-25
-
-
Pangalos, G.1
Gritzalis, D.2
Khair, M.3
Bozios, L.4
-
5
-
-
0004190705
-
-
New York: ACM Press
-
CASTANO, S., FUGINI, M., MARTELLA, G., and SAMARATI, P. (1995) Database Security (New York: ACM Press).
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
6
-
-
0041667570
-
Secure database development methodologies
-
C. E. Landwehr (ed.), (Amsterdam: North-Holland)
-
FUGINI, M. (1988) Secure database development methodologies. In Database Security : Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 103-129.
-
(1988)
Database Security : Status and Prospects
, pp. 103-129
-
-
Fugini, M.1
-
7
-
-
0242528829
-
A user-role based data security approach
-
C. E. Landwehr (ed.), (Amsterdam: North-Holland)
-
TING, T. (1988) A user-role based data security approach. In Database Security: Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 187-208.
-
(1988)
Database Security: Status and Prospects
, pp. 187-208
-
-
Ting, T.1
-
9
-
-
0028374740
-
An approach to authorization modelling in object-oriented database systems
-
BERTINO, E., and WEIGARD, H. (1994) An approach to authorization modelling in object-oriented database systems. Data and Knowledge Engineering, 12, 1-29.
-
(1994)
Data and Knowledge Engineering
, vol.12
, pp. 1-29
-
-
Bertino, E.1
Weigard, H.2
-
10
-
-
0242571490
-
Role-based security in database management systems
-
C. E. Landwehr (ed.), (Amsterdam: North-Holland)
-
LOCHOVSKY, F., and WOO, C. (1988) Role-based security in database management systems. In Database Security: Status and Prospects, C. E. Landwehr (ed.), (Amsterdam: North-Holland), pp. 209-222.
-
(1988)
Database Security: Status and Prospects
, pp. 209-222
-
-
Lochovsky, F.1
Woo, C.2
-
11
-
-
0028715549
-
Design for dynamic user-role-based security
-
MOHAMMED, I., and DILTS, D. (1994) Design for dynamic user-role-based security. Computers and Security, 13, 661-671.
-
(1994)
Computers and Security
, vol.13
, pp. 661-671
-
-
Mohammed, I.1
Dilts, D.2
-
12
-
-
0019145446
-
Data base security : Requirements, policies and models
-
WOOD, C., FERNANDEZ, E. B., and SUMMERS, R. C. (1980) Data base security : requirements, policies and models. IBM Systems Journal, 19(2), 229-252.
-
(1980)
IBM Systems Journal
, vol.19
, Issue.2
, pp. 229-252
-
-
Wood, C.1
Fernandez, E.B.2
Summers, R.C.3
-
13
-
-
70350563008
-
Interfacing Relational Databases and Prolog Efficiently
-
L. Kerschberg (ed.), (California: Benjamin Cummings Publishing Co)
-
CERI, S., GOTTLOB, G., and WIEDERHOLD, G. (1987) Interfacing Relational Databases and Prolog Efficiently. Expert Database Systems, L. Kerschberg (ed.), (California: Benjamin Cummings Publishing Co), pp. 207-223.
-
(1987)
Expert Database Systems
, pp. 207-223
-
-
Ceri, S.1
Gottlob, G.2
Wiederhold, G.3
-
14
-
-
0025586655
-
Combining Prolog with an RDBMS for applications in software configuration management
-
S. Deen and G. Thomas (eds) (London: Pitman)
-
FARRIS, C., and SINGLETON, P. (1989) Combining Prolog with an RDBMS for applications in software configuration management. In Proceedings of the Working Conference on Data and Knowledge Base Integration, S. Deen and G. Thomas (eds) (London: Pitman), pp. 169-180.
-
(1989)
Proceedings of the Working Conference on Data and Knowledge Base Integration
, pp. 169-180
-
-
Farris, C.1
Singleton, P.2
-
15
-
-
0029340990
-
Architectures and monitoring techniques for active databases: An evaluation
-
CHAKRAVARTHY, S. (1995) Architectures and monitoring techniques for active databases: An evaluation. Data and Knowledge Engineering, 16, 1-26.
-
(1995)
Data and Knowledge Engineering
, vol.16
, pp. 1-26
-
-
Chakravarthy, S.1
-
16
-
-
0026261259
-
Design aspects of access control in a knowledge base system
-
STEINKE, G. (1991) Design aspects of access control in a knowledge base system. Computers and Security, 10, 612-625.
-
(1991)
Computers and Security
, vol.10
, pp. 612-625
-
-
Steinke, G.1
|