-
1
-
-
85055522378
-
-
Special issue on heterogeneous database systems. ACM Computing Surveys 22: 3, 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, pp. 3
-
-
-
2
-
-
85055513249
-
-
Special issue on components and frameworks. Communications of the ACM 40: 10, 1997.
-
(1997)
Communications of the ACM
, vol.40
, pp. 10
-
-
-
8
-
-
0020148286
-
An implementation tec hnique for database quer y languages
-
Buneman, P. et al. An implementation tec hnique for database quer y languages. ACM Transactions on Database Systems 7: 2, 1982.
-
(1982)
ACM Transactions on Database Systems
, vol.7
, pp. 2
-
-
Buneman, P.1
-
11
-
-
84976766949
-
The entity relationship model—Toward a unified view of data
-
Chen, P. The entity relationship model—Toward a unified view of data. ACM Transactions on Database Systems 1: 1, 1976.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, pp. 1
-
-
Chen, P.1
-
12
-
-
0014797273
-
A relational model of data for larg e shared data banks
-
Codd, E.F. A relational model of data for larg e shared data banks. Communications of the ACM 13: 6, 1970.
-
(1970)
Communications of the ACM
, vol.13
, pp. 6
-
-
Codd, E.F.1
-
14
-
-
85055471987
-
Proceedings of the IEEE Data Engineering Conference Series
-
Los Alamitos, CA
-
Proceedings of the IEEE Data Engineering Conference Series. IEEE Computer Society Press: Los Alamitos, CA.
-
IEEE Computer Society
-
-
-
16
-
-
85055471945
-
-
Ed. B. Thuraisingham. Auerbach: New York
-
Data Management Handbook Supplement. Ed. B. Thuraisingham. Auerbach: New York, 1996.
-
(1996)
-
-
-
17
-
-
85055565630
-
-
ed. B. Thuraisingham. Auerbach: New York
-
Data Management Handbook. ed. B. Thuraisingham. Auerbach: New York, 1997.
-
(1997)
-
-
-
18
-
-
85055547098
-
-
MIT Total Data Quality Management Program
-
MIT Total Data Quality Management Program. Available at http://web.mit.edu/tdqm/www/index.shtml.
-
-
-
-
20
-
-
0022079381
-
The category concept: An extension to the entity relationship model
-
Elmasri, R. et al. The category concept: An extension to the entity relationship model. Data and Knowledge Engineering Journal 1: 2, 1985.
-
(1985)
Data and Knowledge Engineering Journal
, vol.1
, pp. 2
-
-
Elmasri, R.1
-
23
-
-
85055470448
-
Special issue: Heterogeneous database systems
-
December
-
Special issue: Heterogeneous database systems, IEEE Computer, 24: 12, December 1999.
-
(1999)
IEEE Computer
, vol.24
, pp. 12
-
-
-
26
-
-
85055568172
-
-
Kdnuggets
-
Kdnuggets. Available at www.kdn.com.
-
-
-
-
30
-
-
85055521485
-
-
IEEE Mass Storage Systems Technical Committee
-
IEEE Mass Storage Systems Technical Committee. Available at http://www.msstc.org/.
-
-
-
-
31
-
-
85055569917
-
-
Morgan Kaufmann: San Mateo, CA
-
Object Database Standard: ODMB 93. Object Database Management Group, Morgan Kaufmann: San Mateo, CA, 1993.
-
(1993)
Object Database Management Group
-
-
-
38
-
-
85055511972
-
-
American National Standards Institute, Draft
-
SQL3. American National Standards Institute, Draft, 1992.
-
(1992)
-
-
-
48
-
-
0026836188
-
Mediators in the arc hitecture of future information systems
-
March
-
Wiederhold, G. Mediators in the arc hitecture of future information systems. IEEE Computer. 25: 3, (March) 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
-
-
Wiederhold, G.1
-
50
-
-
85055500289
-
-
Committee on Multilev el Data Management Security, Multilevel Data Management Security. National Academy Press: Washington, DC
-
Air Force Studies Board, Committee on Multilev el Data Management Security, Multilevel Data Management Security. National Academy Press: Washington, DC, 1983.
-
(1983)
-
-
-
54
-
-
0004190705
-
-
Addison-Wesley: Reading, MA
-
Castano, S. et al. Database Security. Addison-Wesley: Reading, MA, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
-
59
-
-
77954107830
-
Secure database systems
-
eds. M. Piatini and O. Diaz, Artech, London, UK
-
Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Systems, eds. M. Piatini and O. Diaz, Artech, London, UK, 2000.
-
(2000)
Advances in Database Systems
-
-
Ferrari, E.1
Thuraisingham, B.2
-
69
-
-
85055485709
-
-
National Computer Security Center and National Institute of Standards and Technology Publication, MD
-
Proceedings of the National Computer Security Conference Series. National Computer Security Center and National Institute of Standards and Technology Publication, MD.
-
Proceedings of the National Computer Security Conference Series
-
-
-
71
-
-
85055507947
-
-
The Object Management Group
-
The Object Management Group. Available at www.omg.org.
-
-
-
-
73
-
-
85055505907
-
-
Trusted Computer Systems Evaluation Criteria. National Computer Security Center, Linthicum, MD
-
Trusted Computer Systems Evaluation Criteria. National Computer Security Center, Linthicum, MD, 1985.
-
(1985)
-
-
-
74
-
-
85055531189
-
-
Trusted Database Interpretation. National Computer Security Center, Linthicum, MD
-
Trusted Database Interpretation. National Computer Security Center, Linthicum, MD, 1991.
-
(1991)
-
-
-
75
-
-
85055474730
-
-
Trusted Network Interpretation. National Computer Security center, Linthicum, MD
-
Trusted Network Interpretation. National Computer Security center, Linthicum, MD, 1987.
-
(1987)
-
-
-
76
-
-
0004141908
-
-
Prentice-Hall: Upper Saddle River, NJ
-
Tannenbaum, A. Computer Networks. Prentice-Hall: Upper Saddle River, NJ, 1990.
-
(1990)
Computer Networks
-
-
Tannenbaum, A.1
-
77
-
-
84976740459
-
Mandatory security for object-oriented database systems
-
New Orleans, LA, October
-
Thuraisingham, B. Mandatory security for object-oriented database systems. In Proceedings of the ACM OOPOSLA Conference, New Orleans, LA, October, 1989.
-
(1989)
Proceedings of the ACM OOPOSLA Conference
-
-
Thuraisingham, B.1
-
78
-
-
85055576796
-
Multilevel security in distributed database systems
-
Thuraisingham, B. Multilevel security in distributed database systems. Computers and Security 10: 6, 1991.
-
(1991)
Computers and Security
, vol.10
, pp. 6
-
-
Thuraisingham, B.1
-
79
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
80
-
-
85055576796
-
Multilevel security in federated database systems
-
Thuraisingham, B. Multilevel security in federated database systems. Computers and Security 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
81
-
-
0345897549
-
Special issue on computer-supported cooperative work
-
Special issue on computer-supported cooperative work. Communications of the ACM, 34: 12, December 1991.
-
(1991)
Communications of the ACM
, vol.34
, pp. 12
-
-
-
82
-
-
85055218907
-
Towards a real-time agent architecture: A white paper
-
Monterey, CA
-
DiPippo, L., Hodys, E., and Thuraisingham, B. Towards a real-time agent architecture: A white paper. In Proceedings of IEEE WORDS, Monterey, CA, 1999.
-
(1999)
Proceedings of IEEE WORDS
-
-
Dipippo, L.1
Hodys, E.2
Thuraisingham, B.3
-
85
-
-
85055478897
-
-
ed. A. Hurson et al. IEEE Computer Society Press: Los Alamitos, CA
-
Parallel Architectures for Databases, IEEE Tutorial. ed. A. Hurson et al. IEEE Computer Society Press: Los Alamitos, CA, 1989.
-
(1989)
IEEE Tutorial
-
-
-
86
-
-
85055489257
-
Special issue in collaborative computing
-
Special issue in collaborative computing. IEEE Computer 32: 9, 1999.
-
(1999)
IEEE Computer
, vol.32
, pp. 9
-
-
-
87
-
-
85055514739
-
Special issue in audio mining
-
Special issue in audio mining. IEEE Computer 36: 2, 2003.
-
(2003)
IEEE Computer
, vol.36
, pp. 2
-
-
-
88
-
-
0002029118
-
Querying in highly mobile distributed environments
-
Vancouver, BC, August
-
Imielinski, T., Imielinski, T., and Badrinath, B. Querying in highly mobile distributed environments. In Proceedings of the VLDB Conference, Vancouver, BC, August 1992.
-
(1992)
Proceedings of the VLDB Conference
-
-
Imielinski, T.1
Imielinski, T.2
Badrinath, B.3
-
91
-
-
0003509852
-
-
MIT Press: Cambridge, MA
-
Morey, D., Maybury, M., and Thuraisingham, B. (eds.) Knowledge Management. MIT Press: Cambridge, MA, 2001.
-
(2001)
Knowledge Management
-
-
Morey, D.1
Maybury, M.2
Thuraisingham, B.3
-
94
-
-
85055525044
-
-
Available at http://www.w3.org/MarkUp/SGML/.
-
-
-
-
96
-
-
85055486898
-
-
ACM SIGMOD Record 30: 3, 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.3
-
-
-
97
-
-
17244364718
-
Piazza peer-to-peer data management
-
Tatarinov, I. et al. Piazza peer-to-peer data management. ACM SIGMOD Record 32: 3, 2003.
-
(2003)
ACM SIGMOD Record
, vol.32
, pp. 3
-
-
Tatarinov, I.1
-
106
-
-
84976753050
-
An object-oriented approach to multimedia databases
-
Washington, DC, June
-
Woelk, D. et al. An object-oriented approach to multimedia databases. In Proceedings of the ACM SIGMOD Conference, Washington, DC, June 1986.
-
(1986)
Proceedings of the ACM SIGMOD Conference
-
-
Woelk, D.1
-
112
-
-
0002045898
-
Role-based access control models
-
Sandhu, R. et al. Role-based access control models. IEEE Computer 29: 2, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 2
-
-
Sandhu, R.1
-
113
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM: New York
-
Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference, ACM: New York, 1974.
-
Proceedings of the ACM Annual Conference
, pp. 1974
-
-
Stonebraker, M.1
Wong, E.2
-
114
-
-
48249083391
-
STAR-tree: An index structure for efficient evaluation of spatiotemporal authorization
-
Spain, July
-
Atluri, V. and Guo, Q. STAR-tree: An index structure for efficient evaluation of spatiotemporal authorization, In Proceedings of the IFIP Database Security Conference, Sitges, Spain, July, 2004.
-
Proceedings of the IFIP Database Security Conference, Sitges
, pp. 2004
-
-
Atluri, V.1
Guo, Q.2
-
115
-
-
85055469084
-
Integrity constraint processing during transaction processing
-
Bertino, E. and Musto, D. Integrity constraint processing during transaction processing. Acta Informatica, 26: 1, 1989.
-
(1989)
Acta Informatica
, vol.26
, pp. 1
-
-
Bertino, E.1
Musto, D.2
-
118
-
-
85055470992
-
Multilevel security for relational database systems
-
Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 3
-
-
Dwyer, P.1
-
121
-
-
0024627547
-
Secure query processing strategies
-
Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
-
(1989)
IEEE Computer
, vol.22
, pp. 3
-
-
Keefe, T.1
-
122
-
-
85055469216
-
-
Smart Center Management. Available at http://www.unipalm.co.uk/products/e-security/check-point/$smartcenter-management.cfm.
-
-
-
-
123
-
-
85055559269
-
-
Draft. American National Standards Institute
-
SQL3. Draft. American National Standards Institute, 1992.
-
(1992)
-
-
-
124
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM: New York
-
Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference, ACM: New York, 1974.
-
(1974)
Proceedings of the ACM Annual Conference
-
-
Stonebraker, M.1
Wong, E.2
-
125
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 6
-
-
Thuraisingham, B.1
-
127
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
128
-
-
85055532644
-
-
Committee on Multilev el Data Management Security. Multilevel Data Management Security. National Academy Press: Washington, DC
-
Air Force Studies Board, Committee on Multilev el Data Management Security. Multilevel Data Management Security. National Academy Press: Washington, DC, 1983.
-
(1983)
-
-
-
129
-
-
85055553011
-
Providing different degrees of recency options to transactions in multilevel secure databases
-
Rensselaerville, New York, August 1995. North Holland: Amsterdam
-
Atluri, V. et al. Providing different degrees of recency options to transactions in multilevel secure databases. In Proceedings of the IFIP Database Security Conference, Rensselaerville, New York, August 1995. North Holland: Amsterdam, 1996.
-
(1996)
Proceedings of the IFIP Database Security Conference
-
-
Atluri, V.1
-
130
-
-
85055558492
-
Object-oriented approac h to developing real-time infrastructure and data manager
-
Laguna Beach, CA, February
-
Bensley E. et al. Object-oriented approac h to developing real-time infrastructure and data manager. In Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems, Laguna Beach, CA, February 1996.
-
(1996)
Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems
-
-
Bensley, E.1
-
131
-
-
0020148286
-
An implementation tec hnique for database quer y languages
-
Buneman, P. et al. An implementation tec hnique for database quer y languages. ACM Transactions on Database Systems 7: 2, 1982.
-
(1982)
ACM Transactions on Database Systems
, vol.7
, pp. 2
-
-
Buneman, P.1
-
133
-
-
84976766949
-
The entity-relationship model—Toward a unified view of data
-
Chen, P. The entity-relationship model—Toward a unified view of data. ACM Transactions on Database Systems 1: 1, 1976.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, pp. 1
-
-
Chen, P.1
-
134
-
-
85052682088
-
The SINTRA data model: Structure and operations
-
Huntsville AL, 1993. North Holland: Amsterdam
-
Costich, O. et al. The SINTRA data model: Structure and operations. In Proceedings of the IFIP Database Security Conference, Huntsville AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security Conference
-
-
Costich, O.1
-
141
-
-
85052674079
-
Views as the security objects in a multilevel secure relational database management system
-
Oakland, CA, April
-
Garvey, C. and Wu, A. Views as the security objects in a multilevel secure relational database management system. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1988.
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Garvey, C.1
Wu, A.2
-
144
-
-
85055590390
-
Design overview for retrofitting integritylock architecture onto a commercial DBMS
-
Oakland, CA, April
-
Graubart, R. and Duffy, K. Design overview for retrofitting integritylock architecture onto a commercial DBMS. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1985.
-
(1985)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Graubart, R.1
Duffy, K.2
-
145
-
-
85055562446
-
-
A model of a protected data management system. Technical Report ESD-TR-76-289, I. P. Sharp Associates: Bedford, MA, June
-
Grohn, M. A model of a protected data management system. Technical Report ESD-TR-76-289, I. P. Sharp Associates: Bedford, MA, June 1976.
-
(1976)
-
-
Grohn, M.1
-
146
-
-
85055503145
-
-
Secure data management system. Technical Report RADC-TR-75-266, System Development Corp. Santa Monica, CA, November
-
Hinke T. and Schaefer, M. Secure data management system. Technical Report RADC-TR-75-266, System Development Corp. Santa Monica, CA, November 1975.
-
(1975)
-
-
Hinke, T.1
Schaefer, M.2
-
147
-
-
85055536980
-
-
IEEE Computer 16: 7, 1983.
-
(1983)
IEEE Computer
, vol.16
, Issue.7
-
-
-
150
-
-
0025137221
-
Transaction processing in multilevel-secure databases using replicated architecture
-
Oakland, CA, April
-
Jajodia, S. and Kogan, B. Transaction processing in multilevel-secure databases using replicated architecture. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1990.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Kogan, B.2
-
151
-
-
0025065897
-
Interpreting an object-oriented data model with multilevel security
-
Oakland, CA, May
-
Jajodia, S. and Kogan, B. Interpreting an object-oriented data model with multilevel security, Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1990.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Kogan, B.2
-
153
-
-
0024627547
-
Secure query processing strategies
-
March
-
Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, March 1989.
-
(1989)
IEEE Computer
, vol.22
, pp. 3
-
-
Keefe, T.1
-
157
-
-
84902436516
-
Using parameterized UML to specify and compose access control models
-
Lausanne, Switzerland, 2003. Kluwer: Hingham, MA
-
Ray, I. et al. Using parameterized UML to specify and compose access control models. In Proceedings of the IFIP Conference on Integrity and Control, Lausanne, Switzerland, 2003. Kluwer: Hingham, MA, 2004.
-
(2004)
Proceedings of the IFIP Conference on Integrity and Control
-
-
Ray, I.1
-
158
-
-
85055559343
-
A fine grained access control model for objectoriented DBMSs
-
Hildesheim, Germany, August
-
Rosenthal, A. et al. A fine grained access control model for objectoriented DBMSs. In Proceedings IFIP Database Security Conference, Hildesheim, Germany, August 1994.
-
(1994)
Proceedings IFIP Database Security Conference
-
-
Rosenthal, A.1
-
160
-
-
0028055452
-
Applying OMT for designing multilevel database applications
-
Huntsville, AL, September 1993. North Holland: Amsterdam
-
Sell, P. and Thuraisingham, B. Applying OMT for designing multilevel database applications. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, September 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security Conference
-
-
Sell, P.1
Thuraisingham, B.2
-
161
-
-
85055491278
-
An adaptive policy for improved timeliness in secure database systems
-
Rensselaerville, New York, August 1995. Chapman & Hall: London
-
Son, S. et al. An adaptive policy for improved timeliness in secure database systems. In Proceedings of the IFIP Databases Security Conference, Rensselaerville, New York, August 1995. Chapman & Hall: London, 1996.
-
(1996)
Proceedings of the IFIP Databases Security Conference
-
-
Son, S.1
-
163
-
-
85055535574
-
-
Trusted Computer Systems Evaluation Criteria, National Computer Security Center, MD
-
Trusted Computer Systems Evaluation Criteria, National Computer Security Center, MD, 1985.
-
(1985)
-
-
-
164
-
-
85055469421
-
-
Trusted Database Interpretation. National Computer Security Center, Linthicum, MD
-
Trusted Database Interpretation. National Computer Security Center, Linthicum, MD, 1991.
-
(1991)
-
-
-
165
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 6
-
-
Thuraisingham, B.1
-
167
-
-
84976740459
-
Mandatory security for object-oriented database systems
-
October 1989. ACM: New York
-
Thuraisingham, B. Mandatory security for object-oriented database systems. In Proceedings of the ACM OOPOSLA Conference, October 1989. ACM: New York, 1989.
-
(1989)
Proceedings of the ACM OOPOSLA Conference
-
-
Thuraisingham, B.1
-
169
-
-
85055576796
-
Multilevel security for functional database systems
-
Thuraisingham, B. Multilevel security for functional database systems. Computers and Security, 9: 6, 1989.
-
(1989)
Computers and Security
, vol.9
, pp. 6
-
-
Thuraisingham, B.1
-
170
-
-
33947244773
-
Multilevel security for multimedia database systems
-
Halifax, England, September 1990. North Holland: Amsterdam
-
Thuraisingham, B. Multilevel security for multimedia database systems. In Proceedings of the IFIP Database Security Conference, Halifax, England, September 1990. North Holland: Amsterdam, 1991.
-
(1991)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
171
-
-
85055222385
-
Recursion theoretic proper ties of the inference problem
-
Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291 June
-
Thuraisingham, B. Recursion theoretic proper ties of the inference problem. Presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291 June 1990).
-
(1990)
IEEE Computer Security Foundations Workshop
-
-
Thuraisingham, B.1
-
172
-
-
85054221583
-
The use of conceptual structures to handle the inference problem
-
Shepherdstown, WV. North Holland: Amsterdam
-
Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV. North Holland: Amsterdam, 1992
-
(1992)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
173
-
-
85055576796
-
Multilevel security for distributed database systems
-
Thuraisingham, B. Multilevel security for distributed database systems. Computers and Security, 11: 6, 1991.
-
(1991)
Computers and Security
, vol.11
, pp. 6
-
-
Thuraisingham, B.1
-
176
-
-
1442321816
-
Concurrency control in trusted database management systems: A survey
-
Thuraisingham, B. and Ko, H. Concurrency control in trusted database management systems: A survey, ACM SIGMOD Record, 22: 4, 1993.
-
(1993)
ACM SIGMOD Record
, vol.22
, pp. 4
-
-
Thuraisingham, B.1
Ko, H.2
-
177
-
-
85052688206
-
Towards the design of a standard multilevel relational data model
-
Thuraisingham, B. Towards the design of a standard multilevel relational data model, Computer Standards and Interface Journal, 15: 1, 1993.
-
(1993)
Computer Standards and Interface Journal
, vol.15
, pp. 1
-
-
Thuraisingham, B.1
-
178
-
-
85055576796
-
Multilevel security for federated database system
-
Thuraisingham, B. Multilevel security for federated database system. Computers and Security, 14: 6, 1994.
-
(1994)
Computers and Security
, vol.14
, pp. 6
-
-
Thuraisingham, B.1
-
181
-
-
85052672931
-
Using SWORD for the military aircraft command example database
-
Vancouver, British Columbia. North Holland: Amsterdam
-
Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia. North Holland: Amsterdam, 1993.
-
Proceedings of the IFIP Database Security Conference
, pp. 1993
-
-
Wiseman, S.1
-
186
-
-
85052697580
-
A comparison of three secure DBMS arc hitectures
-
Monterey, CA, 1989. North Holland: Amsterdam
-
Graubart, R. A comparison of three secure DBMS arc hitectures. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1989.
-
(1989)
Proceedings of the IFIP Database Security Conference
-
-
Graubart, R.1
-
187
-
-
85052684905
-
DBMS trusted computing base taxonomy
-
Monterey, CA, 1989. North Holland: Amsterdam
-
Hinke, T. DBMS trusted computing base taxonomy. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1989.
-
(1989)
Proceedings of the IFIP Database Security Conference
-
-
Hinke, T.1
-
189
-
-
85055560450
-
-
Trusted Database Interpretation. National Computer Security Center. Linthicum, MD
-
Trusted Database Interpretation. National Computer Security Center. Linthicum, MD, 1991.
-
(1991)
-
-
-
190
-
-
85055495401
-
Recent developments in database security
-
Orlando, FL, September 1989. Also available as MITRE Paper, 1989 (publicly released)
-
Thuraisingham, B. Recent developments in database security. In Proceedings of the 1989 IEEE COMPSAC Conference Tutorial Proceedings, Orlando, FL, September 1989. Also available as MITRE Paper, 1989 (publicly released).
-
Proceedings of the 1989 IEEE COMPSAC Conference Tutorial Proceedings
-
-
Thuraisingham, B.1
-
192
-
-
85055490398
-
The advanced secure DBMS: Making secure DBMSs usable
-
Kingston, Canada, October 1988. North Holland: Amsterdam
-
Garvey, C. et al. The advanced secure DBMS: Making secure DBMSs usable. In Proceedings of the IFIP Database Security Conference, Kingston, Canada, October 1988. North Holland: Amsterdam, 1989.
-
(1989)
Proceedings of the IFIP Database Security Conference
-
-
Garvey, C.1
-
193
-
-
0025065653
-
Polyinstantiation, integrity in multilevel relations
-
Oakland, CA, May
-
Jajodia, S. and Sandhu, R. Polyinstantiation, integrity in multilevel relations. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1990.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Sandhu, R.2
-
195
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B. et al. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
-
196
-
-
24644455920
-
Privacy constraint processing in a privacy enhanced database system
-
Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
-
(2005)
Data and Knowledge Engineering Journal
-
-
Thuraisingham, B.1
-
197
-
-
85055571738
-
On the problem of security in data bases
-
Monterey, CA, 1989. North Holland: Amsterdam
-
Simon, W. On the problem of security in data bases. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1990.
-
(1990)
Proceedings of the IFIP Database Security Conference
-
-
Simon, W.1
-
198
-
-
85052672931
-
Using SWORD for the military aircraft command example database
-
Vancouver, British Columbia, August 1992. North Holland: Amsterdam
-
Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia, August 1992. North Holland: Amsterdam, 1993.
-
(1993)
Proceedings of the IFIP Database Security Conference
-
-
Wiseman, S.1
-
199
-
-
0031222594
-
Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions
-
Atluri, V. Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions. IEEE Transactions on Knowledge and Data Engineering 9: 5, 1997.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, pp. 5
-
-
Atluri, V.1
-
201
-
-
0027767269
-
Maintaining multilevel transaction atomicity in MLS database systems with kernelized architecture
-
Vancouver, Canada 1992. North Holland: Amsterdam
-
Costich, O. and Jajodia, S. Maintaining multilevel transaction atomicity in MLS database systems with kernelized architecture. In Proceedings of the IFIP Database Security Conference, Vancouver, Canada 1992. North Holland: Amsterdam, 1993.
-
(1993)
Proceedings of the IFIP Database Security Conference
-
-
Costich, O.1
Jajodia, S.2
-
203
-
-
85055470992
-
Multilevel security for relational database systems
-
Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 3
-
-
Dwyer, P.1
-
204
-
-
0025137221
-
Transaction processing in multilevel secure databases using replicated architecture
-
Oakland, CA, May
-
Jajodia, S. and Kogan, B. Transaction processing in multilevel secure databases using replicated architecture. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1990.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Kogan, B.2
-
205
-
-
85055466776
-
Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
-
Huntsville, AL, 1993. North Holland: Amsterdam
-
Jajodia, S. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security
-
-
Jajodia, S.1
-
206
-
-
0024627547
-
Secure query processing strategies
-
Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
-
(1989)
IEEE Computer
, vol.22
, pp. 3
-
-
Keefe, T.1
-
207
-
-
0024983449
-
Multiversion concurrency control for multilevel secure database systems
-
Oakland, CA, May
-
Keefe, T. and Tsai, W. Multiversion concurrency control for multilevel secure database systems. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1990.
-
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 1990
-
-
Keefe, T.1
Tsai, W.2
-
208
-
-
1442321816
-
A survey of concurrency control in trusted database management systems
-
Ko, H. and Thuraisingham, B. A survey of concurrency control in trusted database management systems. ACM SIGMOD Record 22: 4, 1993.
-
(1993)
ACM SIGMOD Record
, vol.22
, pp. 4
-
-
Ko, H.1
Thuraisingham, B.2
-
211
-
-
0038896772
-
Security checking for relational database systems augmented with inference engines
-
Thuraisingham, B. Security checking for relational database systems augmented with inference engines. Computers and Security 6: 6, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 6
-
-
Thuraisingham, B.1
-
212
-
-
85055576796
-
Multilevel security in distributed database systems
-
Thuraisingham, B. Multilevel security in distributed database systems. Computers and Security 10: 6, 1991.
-
(1991)
Computers and Security
, vol.10
, pp. 6
-
-
Thuraisingham, B.1
-
214
-
-
85052682088
-
The SINTRA data model: Structure and operations
-
Huntsville, AL, 1993. North Holland: Amsterdam
-
Costich, O. et al. The SINTRA data model: Structure and operations. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security Conference
-
-
Costich, O.1
-
216
-
-
85055510920
-
A trusted database management system using parallelism
-
Kingston, Ontario, Canada, October
-
Froscher, J. and Meadows, C. A trusted database management system using parallelism. In Proceedings of the IFIP Database Security Conference, Kingston, Ontario, Canada, October 1988.
-
(1988)
Proceedings of the IFIP Database Security Conference
-
-
Froscher, J.1
Meadows, C.2
-
217
-
-
85055490398
-
The advanced secure DBMS: Making secure DBMSs usable
-
Kingston, Ontario, Canada, 1988. North Holland: Amsterdam
-
Garvey, C. et al. The advanced secure DBMS: Making secure DBMSs usable. In Proceedings of the IFIP Database Security Conference, Kingston, Ontario, Canada, 1988. North Holland: Amsterdam, 1989.
-
(1989)
Proceedings of the IFIP Database Security Conference
-
-
Garvey, C.1
-
218
-
-
0020254968
-
A preliminary naval surveillance DBMS’ security model
-
Oakland, CA, April
-
Graubart, R. and Woodward, J. A preliminary naval surveillance DBMS’ security model. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, April 1982.
-
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 1982
-
-
Graubart, R.1
Woodward, J.2
-
221
-
-
85052697580
-
A comparison of three secure DBMS arc hitectures
-
Monterey, CA, 1989. North Holland: Amsterdam
-
Graubart, R. A comparison of three secure DBMS arc hitectures. In Proceedings of the IFIP Database Security Conference, Monterey, CA, 1989. North Holland: Amsterdam, 1990.
-
(1990)
Proceedings of the IFIP Database Security Conference
-
-
Graubart, R.1
-
223
-
-
85055527288
-
SDDM—A prototype of a distributed architecture for database security
-
Los Angeles, February
-
Jensen, C. SDDM—A prototype of a distributed architecture for database security. In Proceedings of the IEEE Data Engineering Conference, Los Angeles, February 1989.
-
(1989)
Proceedings of the IEEE Data Engineering Conference
-
-
Jensen, C.1
-
229
-
-
85052672931
-
Using SWORD for the military aircraft command example database
-
Vancouver, BC, North Holland: Amsterdam
-
Wiseman, S. Using SWORD for the military aircraft command example database. In Proceedings of the IFIP Database Security Conference, Vancouver, BC, North Holland: Amsterdam, 1993.
-
(1993)
Proceedings of the IFIP Database Security Conference
-
-
Wiseman, S.1
-
230
-
-
84926396434
-
A machine independent theory of the complexity of recursive functions
-
Blum, M. A machine independent theory of the complexity of recursive functions. Journal of the Association for Computing Machinery 2: 14, 1967.
-
(1967)
Journal of the Association for Computing Machinery
, vol.2
, pp. 14
-
-
Blum, M.1
-
233
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
Clifton, C. Using sample size to limit exposure to data mining. Journal of Computer Security 8: 4, 2000
-
(2000)
Journal of Computer Security
, vol.8
, pp. 4
-
-
Clifton, C.1
-
234
-
-
85055572234
-
Deductive object-oriented data model for handling the inference problem
-
San Diego, CA, August
-
Collins, M. et al. Deductive object-oriented data model for handling the inference problem. In Proceedings of the AFCEA Database Colloquium, San Diego, CA, August 1996.
-
(1996)
Proceedings of the AFCEA Database Colloquium
-
-
Collins, M.1
-
236
-
-
0018442066
-
The tracker: A threat to statistical database security
-
Denning, D. The tracker: A threat to statistical database security. ACM Transactions in Database Systems 4: 2, 1979.
-
(1979)
ACM Transactions in Database Systems
, vol.4
, pp. 2
-
-
Denning, D.1
-
237
-
-
85060417506
-
The inference problem and updates in relational databases
-
Lake Niagara, Canada, 2001. Kluwer: Hingham, MA
-
Farkas, C. et al. The inference problem and updates in relational databases. In Proceedings of the IFIP Database Security Conference, Lake Niagara, Canada, 2001. Kluwer: Hingham, MA, 2002.
-
(2002)
Proceedings of the IFIP Database Security Conference
-
-
Farkas, C.1
-
239
-
-
85055518241
-
Special issue on computer security
-
Special issue on computer security. IEEE Computer 16: 7, 1983.
-
(1983)
IEEE Computer
, vol.16
, pp. 7
-
-
-
240
-
-
85055475243
-
Release control for XML documents
-
Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
-
Jajodia, S. Release control for XML documents. In Proceedings of the IFIP Conference on Integrity and Control, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2004.
-
(2004)
Proceedings of the IFIP Conference on Integrity and Control
-
-
Jajodia, S.1
-
242
-
-
0027719323
-
Inference secure multilevel databases
-
Vancouver, British Columbia, 1992. North Holland: Amsterdam
-
Lin, T.Y. Inference secure multilevel databases. In Proceedings of the IFIP Database Security Conference, Vancouver, British Columbia, 1992. North Holland: Amsterdam, 1993.
-
(1993)
Proceedings of the IFIP Database Security Conference
-
-
Lin, T.Y.1
-
243
-
-
0036389597
-
Placing the Chinese walls on the boundary of conflicts analysis of symmetric binary relations
-
Oxford, UK, August
-
Lin, T.Y. Placing the Chinese walls on the boundary of conflicts analysis of symmetric binary relations. In Proceedings of the IEEE COMPSAC Conference, Oxford, UK, August 2002.
-
(2002)
Proceedings of the IEEE COMPSAC Conference
-
-
Lin, T.Y.1
-
245
-
-
85055472014
-
Hypersemantic data modeling for inference analysis
-
Hildesheim, Germany, 1994. North Holland: Amsterdam
-
Marks, D. et al. Hypersemantic data modeling for inference analysis. In Proceedings of the IFIP Database Security Conference, Hildesheim, Germany, 1994. North Holland: Amsterdam, 1995.
-
(1995)
Proceedings of the IFIP Database Security Conference
-
-
Marks, D.1
-
249
-
-
84976785631
-
Security and inference in multilevel database and knowledge base systems
-
San Francisco, May
-
Morgenstern, M. Security and inference in multilevel database and knowledge base systems. In Proceedings of the ACM SIGM CD Conference, San Francisco, May 1987.
-
(1987)
Proceedings of the ACM SIGM CD Conference
-
-
Morgenstern, M.1
-
253
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 6
-
-
Thuraisingham, B.1
-
255
-
-
85055222385
-
Recursion theoretic properties of the inference problem
-
Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291, June
-
Thuraisingham, B. Recursion theoretic properties of the inference problem. Presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE Technical Paper MTP291, June 1990).
-
(1990)
IEEE Computer Security Foundations Workshop
-
-
Thuraisingham, B.1
-
256
-
-
85054221583
-
The use of conceptual structures to handle the inference problem
-
Shepherdstown, WV, North Holland: Amsterdam
-
Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV, North Holland: Amsterdam, 1992.
-
(1992)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
257
-
-
33747486880
-
A nonmonotonic typed multilevel logic for multilevel secure database and knowledge base management systems
-
Franconia, NH, June
-
Thuraisingham, B. A nonmonotonic typed multilevel logic for multilevel secure database and knowledge base management systems. In Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1991.
-
(1991)
Proceedings of the IEEE Computer Security Foundations Workshop
-
-
Thuraisingham, B.1
-
259
-
-
85055933889
-
A nonmontonic typed multilevel logic for multilevel secure database and knowledge base management systems II
-
Franconia, NH, June
-
Thuraisingham, B. A nonmontonic typed multilevel logic for multilevel secure database and knowledge base management systems II. In Proceedings of the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1992.
-
(1992)
Proceedings of the IEEE Computer Security Foundations Workshop
-
-
Thuraisingham, B.1
-
260
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
262
-
-
85055472455
-
Release control in database systems
-
Amsterdam, August 2000. North Holland: Amsterdam
-
Wiederhold, G. Release control in database systems. In Proceedings of the IFIP Database Security Conference, Amsterdam, August 2000. North Holland: Amsterdam, 2001.
-
(2001)
Proceedings of the IFIP Database Security Conference
-
-
Wiederhold, G.1
-
263
-
-
0003400251
-
-
Technical Report M74-244, MITRE Corporation, Bedford, MA
-
Bell, D. and LaPadula, L. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corporation, Bedford, MA, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.1
Lapadula, L.2
-
264
-
-
85055470992
-
Multilevel security for relational database systems
-
Dwyer, P. et al. Multilevel security for relational database systems. Computers and Security 6: 3, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 3
-
-
Dwyer, P.1
-
267
-
-
85055475243
-
Release control for XML documents
-
Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
-
Jajodia, S. Release control for XML documents. In Proceedings of the IFIP Conference in Integrity and Control, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2004.
-
(2004)
Proceedings of the IFIP Conference in Integrity and Control
-
-
Jajodia, S.1
-
268
-
-
0024627547
-
Secure query processing strategies
-
Keefe, T. et al. Secure query processing strategies. IEEE Computer 22: 3, 1989.
-
(1989)
IEEE Computer
, vol.22
, pp. 3
-
-
Keefe, T.1
-
271
-
-
84976785631
-
Security and inference in multilevel database and knowledge base systems
-
San Francisco, May
-
Morgenstern, M. Security and inference in multilevel database and knowledge base systems. In Proceedings of the ACM SIGM CD Conference, San Francisco, May 1987.
-
(1987)
Proceedings of the ACM SIGM CD Conference
-
-
Morgenstern, M.1
-
272
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM: New York
-
Stonebraker, M. and Wong, E. Access control in a relational data base management system by query modification. In Proceedings of the ACM Annual Conference. ACM: New York, 1974.
-
(1974)
Proceedings of the ACM Annual Conference
-
-
Stonebraker, M.1
Wong, E.2
-
273
-
-
0038896772
-
Security checking in relational database management systems augmented with inference engines
-
Thuraisingham, B. Security checking in relational database management systems augmented with inference engines. Computers and Security 6: 6, 1987.
-
(1987)
Computers and Security
, vol.6
, pp. 6
-
-
Thuraisingham, B.1
-
274
-
-
85055532018
-
Towards the design of secure database and knowledge base management system
-
Thuraisingham, B. Towards the design of secure database and knowledge base management system. Data and Knowledge Engineering Journal 5: 1, 1990.
-
(1990)
Data and Knowledge Engineering Journal
, vol.5
, pp. 1
-
-
Thuraisingham, B.1
-
275
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
278
-
-
84877330259
-
An overview of the KL-ONE knowledge representation system
-
Brachmann, R. and Schmalze, J. An overview of the KL-ONE knowledge representation system, Cognitive Science, 9: 2, 1985.
-
(1985)
Cognitive Science
, vol.9
, pp. 2
-
-
Brachmann, R.1
Schmalze, J.2
-
282
-
-
0004030676
-
-
PhD Thesis, Carnegie Institute of Technology
-
Quillian R. Semantic memory. PhD Thesis, Carnegie Institute of Technology, 1966.
-
(1966)
Semantic Memory
-
-
Quillian, R.1
-
285
-
-
85055581703
-
Conceptual dependency: A theory of natural language understanding
-
Schank, R. Conceptual dependency: A theory of natural language understanding, Cognitive Science, 3: 4, 1972.
-
(1972)
Cognitive Science
, vol.3
, pp. 4
-
-
Schank, R.1
-
288
-
-
85054221583
-
The use of conceptual structures to handle the inference problem
-
Shepherdstown, WV. North Holland: Amsterdam
-
Thuraisingham, B. The use of conceptual structures to handle the inference problem. In Proceedings of the IFIP Database Security Conference, Shepherdstown, WV. North Holland: Amsterdam, 1992.
-
(1992)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
290
-
-
0002210449
-
-
Bobrow, D. and Collins, A., Eds., Academic Press: New York
-
Woods, W. What’s in a Link: Foundations for Semantic Networks in Representation and Understanding Studies in Cognitive Science, Bobrow, D. and Collins, A., Eds., Academic Press: New York.
-
What’s in a Link: Foundations for Semantic Networks in Representation and Understanding Studies in Cognitive Science
-
-
Woods, W.1
-
291
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E. et al. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and Systems Security 2: 1, 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, pp. 1
-
-
Bertino, E.1
-
292
-
-
85055483544
-
An approac h to deriving global authorizations in federated database systems
-
Chapman & Hall: London
-
Castano, S. et al. An approac h to deriving global authorizations in federated database systems. In Proceedings of the IFIP Database Security Conference, 1996. Chapman & Hall: London, 1997.
-
(1996)
Proceedings of the IFIP Database Security Conference
-
-
Castano, S.1
-
294
-
-
77954107830
-
Secure database systems
-
Piattin, M. and Diaz, O., Eds., Artech, London, UK
-
Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, Piattin, M. and Diaz, O., Eds., Artech, London, UK, 2000.
-
(2000)
Advances in Database Management
-
-
Ferrari, E.1
Thuraisingham, B.2
-
295
-
-
85055543359
-
-
E-Commerce Security, Weak Links and Strong Defenses. Wiley: New York
-
Ghosh, A. E-Commerce Security, Weak Links and Strong Defenses. Wiley: New York, 1998.
-
(1998)
-
-
Ghosh, A.1
-
296
-
-
85055466776
-
Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
-
Huntsville, AL, 1993. North Holland: Amsterdam
-
Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security
-
-
Jajodia, S.1
-
300
-
-
85055583688
-
Data warehousing, data mining and security
-
Como, Italy, 1996. Chapman & Hall: London
-
Thuraisingham, B. Data warehousing, data mining and security. In Proceedings of the IFIP Database Security Conference, Como, Italy, 1996. Chapman & Hall: London, 1997.
-
(1997)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
304
-
-
85055510920
-
Achieving a trusted database management system using parallelism
-
Kingston, Ontario, 1988. North Holland: Amsterdam
-
Froscher J. and Meadows, C. Achieving a trusted database management system using parallelism. In Proceedings of the IFIP Database Security Conference, Kingston, Ontario, 1988. North Holland: Amsterdam, 1989.
-
(1989)
Proceedings of the IFIP Database Security Conference
-
-
Froscher, J.1
Meadows, C.2
-
305
-
-
85055466776
-
Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
-
Huntsville, AL, 1993. North Holland: Amsterdam
-
Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security
-
-
Jajodia, S.1
-
306
-
-
85055527288
-
SDDM—A prototype of a distributed architecture for database security
-
Los Angeles, February
-
Jensen, C. SDDM—A prototype of a distributed architecture for database security. In Proceedings of the IEEE Data Engineering Conference, Los Angeles, February 1989.
-
(1989)
Proceedings of the IEEE Data Engineering Conference
-
-
Jensen, C.1
-
310
-
-
85055571326
-
Design and implementation of a distributed query processor for a trusted distributed database management systems
-
April
-
Thuraisingham, B. and Rubinovitz, H. Design and implementation of a distributed query processor for a trusted distributed database management systems. Journal of Systems and Software, April 1993.
-
(1993)
Journal of Systems and Software
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
312
-
-
0026403732
-
Multilevel security issues in distributed database management systems—II
-
Thuraisingham, B. Multilevel security issues in distributed database management systems—II. Computers and Security Journal 10: 6, 1991.
-
(1991)
Computers and Security Journal
, vol.10
, pp. 6
-
-
Thuraisingham, B.1
-
313
-
-
85055572301
-
Multilevel security for distributed database management system—III
-
Thuraisingham, B. and Rubinovitz, H. Multilevel security for distributed database management system—III, Computers and Security, 10: 5, 1992.
-
(1992)
Computers and Security
, vol.10
, pp. 5
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
314
-
-
0027871109
-
Design and implementation of a distributed database inference controller
-
Phoenix, AZ, October
-
Thuraisingham, B. et al. Design and implementation of a distributed database inference controller. In Proceedings of the IEEE COMPSAC Conference, Phoenix, AZ, October 1993.
-
Proceedings of the IEEE COMPSAC Conference
, pp. 1993
-
-
Thuraisingham, B.1
-
315
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. Security issues for federated database systems, Computers and Security, 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
317
-
-
85055526675
-
Evolvable systems initiative for real-time command and control systems
-
Orlando, FL, November
-
Bensley, E. et al. Evolvable systems initiative for real-time command and control systems. In Proceedings of the First IEEE Complex Systems Conference, Orlando, FL, November 1995.
-
Proceedings of the First IEEE Complex Systems Conference
, pp. 1995
-
-
Bensley, E.1
-
321
-
-
85055466776
-
Integrating concurrency control and commit alg orithms in distributed multilevel secure databases
-
Huntsville, AL, 1993. North Holland: Amsterdam
-
Jajodia, S. et al. Integrating concurrency control and commit alg orithms in distributed multilevel secure databases. In Proceedings of the IFIP Database Security, Huntsville, AL, 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security
-
-
Jajodia, S.1
-
322
-
-
85055552256
-
Integrity constraints in federated databases
-
Como, Italy, 1996. Chapman & Hall: London
-
Olivier, M. Integrity constraints in federated databases. In Proceedings of the IFIP Database Security Conference, Como, Italy, 1996. Chapman & Hall: London, 1992.
-
(1992)
Proceedings of the IFIP Database Security Conference
-
-
Olivier, M.1
-
323
-
-
0026403732
-
Multilevel security issues in distributed database management systems—II
-
Thuraisingham, B. Multilevel security issues in distributed database management systems—II. Computers and Security Journal 10: 6, 1991.
-
(1991)
Computers and Security Journal
, vol.10
, pp. 6
-
-
Thuraisingham, B.1
-
324
-
-
0342296051
-
Multilevel security issues for distributed database management systems—III
-
Thuraisingham, B. and Rubinovitz, H. Multilevel security issues for distributed database management systems—III. Computers and Security 11: 5, 1992.
-
(1992)
Computers and Security
, vol.11
, pp. 5
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
325
-
-
85055510860
-
Security constraint processing in a heterogeneous database system
-
Phoenix, AZ, March
-
Thuraisingham, B. and Rubinovitz, H. Security constraint processing in a heterogeneous database system. In Proceedings of the ACM Computer Conference, Phoenix, AZ, March 1994.
-
Proceedings of the ACM Computer Conference
, pp. 1994
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
326
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
329
-
-
85055573603
-
Extending the ODMG object model with composite objects
-
Vancouver, British Columbia, Canada
-
Bertino, E. and Guerrini, G. Extending the ODMG object model with composite objects. Proceedings of the ACM OOPSLA Conference, Vancouver, British Columbia, Canada, 1998.
-
(1998)
Proceedings of the ACM OOPSLA Conference
-
-
Bertino, E.1
Guerrini, G.2
-
330
-
-
85055552654
-
Role-based security in a distributed resource environment
-
Amsterdam, The Netherlands, August
-
Demurjian, S. et al. Role-based security in a distributed resource environment. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000.
-
(2000)
Proceedings of the IFIP Database Security Conference
-
-
Demurjian, S.1
-
332
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
Oakland, CA, May
-
Jajodia, S. and Kogan, B. Integrating an object-oriented data model with multilevel security. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1990
-
(1990)
IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Kogan, B.2
-
334
-
-
85055526225
-
SODA—A secure object-oriented database system
-
Keefe, T. et al. SODA—A secure object-oriented database system. Computers and Security 9: 5, 1989.
-
(1989)
Computers and Security
, vol.9
, pp. 5
-
-
Keefe, T.1
-
336
-
-
85055532938
-
A security model for multilevel objects with bidirectional relationships
-
Halifax, UK, 1990. North Holland: Amsterdam
-
Morgenstern, M. A security model for multilevel objects with bidirectional relationships. In Proceedings of the IFIP Database Security Conference, Halifax, UK, 1990. North Holland: Amsterdam, 1991.
-
(1991)
Proceedings of the IFIP Database Security Conference
-
-
Morgenstern, M.1
-
338
-
-
0026119329
-
A model of authorization for next-generation database systems
-
Rabitti, F. et al. A model of authorization for next-generation database systems. ACM Transactions on Database Systems 16: 1, 1991.
-
(1991)
ACM Transactions on Database Systems
, vol.16
, pp. 1
-
-
Rabitti, F.1
-
339
-
-
85055594243
-
Security for object-oriented systems
-
Hildesheim, Germany 1994. North Holland: Amsterdam
-
Rosenthal, A. et al. Security for object-oriented systems. In Proceedings of the Database Security Conference, Hildesheim, Germany 1994. North Holland: Amsterdam, 1995.
-
(1995)
Proceedings of the Database Security Conference
-
-
Rosenthal, A.1
-
342
-
-
84918659225
-
An object-oriented approac h for designing secure systems
-
Thuraisingham, B. and Chase, F. An object-oriented approac h for designing secure systems. IEEE CIPHER, 1989.
-
(1989)
IEEE CIPHER
-
-
Thuraisingham, B.1
Chase, F.2
-
344
-
-
85055580885
-
-
June, Technical Report, MTP-291 (also presented at the Object Systems Security Workshop, Karlsruhe, Germany, April 1990)
-
Thuraisingham, B. Mathematical formalisms for multilevel object-oriented systems, June 1990, Technical Report, MTP-291 (also presented at the Object Systems Security Workshop, Karlsruhe, Germany, April 1990).
-
(1990)
Mathematical Formalisms for Multilevel Object-Oriented Systems
-
-
Thuraisingham, B.1
-
345
-
-
84914789679
-
Multilevel secure object-oriented data model—Issues on noncomposite objects, composite objects, and versioning
-
Thuraisingham, B. Multilevel secure object-oriented data model—Issues on noncomposite objects, composite objects, and versioning. Journal of Object-Oriented Programming 4: 6 1991.
-
(1991)
Journal of Object-Oriented Programming
, vol.4
, pp. 6
-
-
Thuraisingham, B.1
-
346
-
-
0029328169
-
Towards the design of a multilevel secure objectoriented database management system
-
Thuraisingham, B. Towards the design of a multilevel secure objectoriented database management system. Journal of Object-Oriented Programming 8: 3, 1995.
-
(1995)
Journal of Object-Oriented Programming
, vol.8
, pp. 3
-
-
Thuraisingham, B.1
-
347
-
-
0040527747
-
Implementing set-oriented production rules as an extension to Starburst
-
Barcelona, Spain, August
-
Widom, J. et al. Implementing set-oriented production rules as an extension to Starburst. In Proceedings of the Very Large Database Conference, Barcelona, Spain, August 1991.
-
(1991)
Proceedings of the Very Large Database Conference
-
-
Widom, J.1
-
348
-
-
85055551478
-
-
Available at http://www.samspublishing.com/articles/article.asp?p=21643.
-
-
-
-
351
-
-
85055585562
-
-
Java security
-
Java security. Available at http://java.sun.com/security/.
-
-
-
-
352
-
-
85055529571
-
MOMT: A multilevel object modeling technique for designing secure database applications
-
Marks, D. et al. MOMT: A multilevel object modeling technique for designing secure database applications. Journal of Object-Oriented Programming 8: 3, 1996.
-
(1996)
Journal of Object-Oriented Programming
, vol.8
, pp. 3
-
-
Marks, D.1
-
353
-
-
85055539241
-
-
Available at http://www.omg.org/technology/documents/formal/omg_security.htm.
-
-
-
-
354
-
-
85055577091
-
Using parameterized UML to specify and compose access control models
-
Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA
-
Ray, I. et al. Using parameterized UML to specify and compose access control models. In Proceedings of the IFIP Integrity and Control Conference, Lausanne, Switzerland, November 2003. Kluwer: Hingham, MA, 2003.
-
(2003)
Proceedings of the IFIP Integrity and Control Conference
-
-
Ray, I.1
-
356
-
-
0028055452
-
Applying OMT for designing multilevel database applications
-
Huntsville, AL, September 1993. North Holland: Amsterdam
-
Sell, P. and Thuraisingham, B. Applying OMT for designing multilevel database applications. In Proceedings of the IFIP Database Security Conference, Huntsville, AL, September 1993. North Holland: Amsterdam, 1994.
-
(1994)
Proceedings of the IFIP Database Security Conference
-
-
Sell, P.1
Thuraisingham, B.2
-
359
-
-
85055482964
-
-
Wijesekera, D. Available at http://www.isse.gmu.edu/dumindaclasses/spring02/umlSecurity3.ppt.
-
-
-
Wijesekera, D.1
-
360
-
-
80052057722
-
Uniform indexing for geospatial data and authorizations
-
July, Cambridge, UK, 2002. Kluwer: Hingham, MA
-
Atluri, V. and Mazzoleni, P. Uniform indexing for geospatial data and authorizations. In Proceedings of the IFIP Database Security Conference, July, Cambridge, UK, 2002. Kluwer: Hingham, MA, 2003.
-
(2003)
Proceedings of the IFIP Database Security Conference
-
-
Atluri, V.1
Mazzoleni, P.2
-
361
-
-
48249083391
-
An index structure for efficient evaluation of spatiotemporal authorizations
-
Sitges, Spain. Kluwer: Hingham, MA, July
-
Atluri, V. and Guo, Q. Star-tree: An index structure for efficient evaluation of spatiotemporal authorizations. In Proceedings of the IFIP Database Security Conference, Sitges, Spain. Kluwer: Hingham, MA, July 2004.
-
(2004)
Proceedings of the IFIP Database Security Conference
-
-
Atluri, V.1
Guo, Q.S.-T.2
-
362
-
-
84904259119
-
Protecting privacy from continuous highresolution satellite surveillance
-
Amsterdam, The Netherlands, August 2000. Kluwer: Hingham, MA
-
Chun, S. and Atluri, V. Protecting privacy from continuous highresolution satellite surveillance. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000. Kluwer: Hingham, MA, 2001.
-
(2001)
Proceedings of the IFIP Database Security Conference
-
-
Chun, S.1
Atluri, V.2
-
363
-
-
77954107830
-
Secure database systems
-
Piatinni, M. and Diaz, O., Eds. Artech: London, UK
-
Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Database Management, Piatinni, M. and Diaz, O., Eds. Artech: London, UK, 2000.
-
(2000)
Advances in Database Management
-
-
Ferrari, E.1
Thuraisingham, B.2
-
364
-
-
85055486385
-
Multilevel security for multimedia systems
-
Halifax, England, Se ptember 1990 (also published as book c hapter by North Holland
-
Thuraisingham, B. Multilevel security for multimedia systems. In Proceedings of the Fourth IFIP WG 11.3 Conference on Database Security, Halifax, England, Se ptember 1990 (also published as book c hapter by North Holland, 1991).
-
(1991)
Proceedings of the Fourth IFIP WG 11.3 Conference on Database Security
-
-
Thuraisingham, B.1
-
366
-
-
0029207994
-
Multilevel security in infor mation retrieval systems— II
-
Thuraisingham, B. Multilevel security in infor mation retrieval systems— II. Information and Management Journal 26, 1995.
-
(1995)
Information and Management Journal
, vol.26
-
-
Thuraisingham, B.1
-
371
-
-
0027334758
-
Parallel processing and tr usted database management systems
-
Indianapolis, IN, February
-
Thuraisingham, B. Parallel processing and tr usted database management systems. In Proceedings of the ACM Computer Science Conference, Indianapolis, IN, February 1993.
-
(1993)
Proceedings of the ACM Computer Science Conference
-
-
Thuraisingham, B.1
-
372
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
373
-
-
85055583688
-
Data warehousing, data mining and security
-
Como, Italy, 1996. Chapman & Hall, London
-
Thuraisingham, B. Data warehousing, data mining and security. In Proceedings of the IFIP Database Security Conference, Como, Italy, 1996. Chapman & Hall, London, 1997.
-
(1997)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
374
-
-
84902520540
-
Grand challenges in data integrity and quality: Panel discussion
-
Lausanne, Switzerland, 2003. Kluwer: Hingham, MA
-
Thuraisingham, B. Grand challenges in data integrity and quality: Panel discussion. In Proceedings of the IFIP Database Integrity Conference, Lausanne, Switzerland, 2003. Kluwer: Hingham, MA, 2004.
-
(2004)
Proceedings of the IFIP Database Integrity Conference
-
-
Thuraisingham, B.1
-
378
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
Chan, P. et al. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 14: 6, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, pp. 6
-
-
Chan, P.1
-
379
-
-
85055593638
-
-
Kdnuggets
-
Available at Kdnuggets, www.kdnuggets.com.
-
-
-
-
380
-
-
84985909197
-
Data mining for computer security applications, tutorial
-
Melbourne, FL
-
Lazarevic, A. et al. Data mining for computer security applications, tutorial. In Proceedings of the IEEE Data Mining Conference, Melbourne, FL, 2003.
-
(2003)
Proceedings of the IEEE Data Mining Conference
-
-
Lazarevic, A.1
-
384
-
-
33745441630
-
-
Ed. H. Kargupta et al. AAAI Press: Cambridge, MA
-
Data Mining for Counter-Terrorism, Next Generation Data Mining. Ed. H. Kargupta et al. AAAI Press: Cambridge, MA, 2004.
-
(2004)
Next Generation Data Mining
-
-
-
390
-
-
0034497773
-
Using sample size to limit exposure to data mining
-
Clifton, C. Using sample size to limit exposure to data mining. Journal of Computer Security 8: 4, 2000.
-
(2000)
Journal of Computer Security
, vol.8
, pp. 4
-
-
Clifton, C.1
-
391
-
-
26444575051
-
-
Technical Report, Purdue University
-
Clifton, C., Kantarcioglu, M., and Vaidya, J. Defining privacy for data mining. Technical Report, Purdue University, 2002.
-
(2002)
Defining Privacy for Data Mining
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
392
-
-
10044273842
-
Tools for privacy preserving distributed data mining
-
Clifton, C. et al. Tools for privacy preserving distributed data mining. SIGKDD Explorations, 4: 2, 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, pp. 2
-
-
Clifton, C.1
-
393
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, July
-
Evfimievski, A., Srikant, R., Agrawal, R., and Gehrke, J. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, July 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
394
-
-
10044250804
-
Research problems in data stream processing and pri vacypreserving data mining
-
Baltimore, November
-
Gehrke, J. Research problems in data stream processing and pri vacypreserving data mining. In Proceedings of the Next Generation Data Mining Workshop, Baltimore, November 2002.
-
(2002)
Proceedings of the Next Generation Data Mining Workshop
-
-
Gehrke, J.1
-
396
-
-
10444240638
-
Privacy sensitive distributed data mining from multiparty data
-
Tucson, AZ, June
-
Kargupta, H. et al. Privacy sensitive distributed data mining from multiparty data. In Proceedings of the Security Informatics Symposium, Tucson, AZ, June 2003.
-
(2003)
Proceedings of the Security Informatics Symposium
-
-
Kargupta, H.1
-
397
-
-
85055478436
-
-
Privacy preserving clustering with distributed EM mixture modeling. Purdue University Report, 2003 (submitted for publication)
-
Lin, A. et al. Privacy preserving clustering with distributed EM mixture modeling. Purdue University Report, 2003 (submitted for publication).
-
-
-
Lin, A.1
-
400
-
-
0242698173
-
Datafly: A system for providing anonymity in medical data
-
Lake Tahoe, CA, August 1997. Chapman & Hall: London
-
Sweeney, L. Datafly: A system for providing anonymity in medical data. In Proceedings of the IFIP Database Security Conference, Lake Tahoe, CA, August 1997. Chapman & Hall: London, 1998.
-
(1998)
Proceedings of the IFIP Database Security Conference
-
-
Sweeney, L.1
-
401
-
-
84995288300
-
Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University
-
Sweeney, L. Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University. ACM Computers and Society, 2004
-
(2004)
ACM Computers and Society
-
-
Sweeney, L.1
-
402
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
403
-
-
85055583688
-
Datawarehousing, data mining, and security
-
Como, Italy, July
-
Thuraisingham, B. Datawarehousing, data mining, and security. In Proceedings of the IFIP Database Security Conference, Como, Italy, July 1996.
-
(1996)
Proceedings of the IFIP Database Security Conference
-
-
Thuraisingham, B.1
-
404
-
-
0003655816
-
-
CRC Press: Boca Raton, FL
-
Thuraisingham, B. Data Mining: Technologies, Techniques, Tools, and Trends. CRC Press: Boca Raton, FL, 1998.
-
(1998)
Data Mining: Technologies, Techniques, Tools, and Trends
-
-
Thuraisingham, B.1
-
406
-
-
10444271317
-
Data mining, national security, privacy and civil liberties
-
Thuraisingham, B. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4: 2, 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, pp. 2
-
-
Thuraisingham, B.1
-
407
-
-
84899169166
-
Privacy preserving data mining: Developments and directions
-
Thuraisingham, B. Privacy preserving data mining: Developments and directions, Journal of Database Management 2004 (to appear).
-
(2004)
Journal of Database Management
-
-
Thuraisingham, B.1
-
408
-
-
24644455920
-
Privacy constraint processing in a privacy enhanced database system
-
Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal 2005 (to appear).
-
(2005)
Data and Knowledge Engineering Journal
-
-
Thuraisingham, B.1
-
409
-
-
77952332120
-
Privacy-preserving K-means clustering over vertically partitioned data
-
Washington, DC
-
Vaidya, J. and Clifton, C. Privacy-preserving K-means clustering over vertically partitioned data. In Proceedings ACM SIGKDD, Washington, DC, 2003.
-
(2003)
Proceedings ACM SIGKDD
-
-
Vaidya, J.1
Clifton, C.2
-
416
-
-
85055514027
-
-
National Academy of Sciences Study Report: Protecting Children from Inappropriate Content on the Inter net. National Academy Press: Washington, DC
-
National Academy of Sciences Study Report: Protecting Children from Inappropriate Content on the Inter net. National Academy Press: Washington, DC, 2002.
-
(2002)
-
-
-
417
-
-
85055570986
-
-
The National Science Foundation
-
The National Science Foundation. Available at www.nsf.gov.
-
-
-
-
419
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., Ford, W., and Collins, M. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
423
-
-
85051789757
-
Managing threats to Web databases and cyber systems: Issues, solutions and challenges
-
Ed., V. Kumar et al. Kluwer: Hingham, MA
-
Thuraisingham, B. Managing threats to Web databases and cyber systems: Issues, solutions and challenges. In Cyber Security: Threats and Solutions, Ed., V. Kumar et al. Kluwer: Hingham, MA, 2005.
-
(2005)
Cyber Security: Threats and Solutions
-
-
Thuraisingham, B.1
-
424
-
-
24644455920
-
Privacy constraint processing in a privacy enhanced database system
-
Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
-
(2005)
Data and Knowledge Engineering Journal
-
-
Thuraisingham, B.1
-
426
-
-
85055568164
-
-
Cyber infrastr ucture. NSF Report
-
Atkins, D. et al. Cyber infrastr ucture. NSF Report. Available at http://www.communitytechnology.org/nsf_ci_report/.
-
-
-
Atkins, D.1
-
429
-
-
85055493211
-
Trust-based context aware access control models in Web services
-
San Diego, July
-
Batty R., Bertino, E., and Ghafoor, A. Trust-based context aware access control models in Web services. In Proceedings of the Web Services Conference, San Diego, July 2004.
-
(2004)
Proceedings of the Web Services Conference
-
-
Batty, R.1
Bertino, E.2
Ghafoor, A.3
-
431
-
-
26444575051
-
-
Technical Report, Purdue University
-
Clifton, C., Kantarcioglu, M., and Vaidya, J. Defining privacy for data mining. Technical Report, Purdue University, 2002.
-
(2002)
Defining Privacy for Data Mining
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
433
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, July
-
Evfimievski, A., Srikant, R., Agrawal, R., and Gehrke, J. Privacy preserving mining of association rules. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, July 2002.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
435
-
-
10044250804
-
Research problems in data stream processing and pri vacypreserving data mining
-
Baltimore, November
-
Gehrke, J. Research problems in data stream processing and pri vacypreserving data mining. In Proceedings of the Next Generation Data Mining Workshop, Baltimore, November 2002.
-
(2002)
Proceedings of the Next Generation Data Mining Workshop
-
-
Gehrke, J.1
-
437
-
-
84858540250
-
Performance-conscious key management in encrypted databases
-
Sitges, Spain, Eds. C. Farkas and P. Samarati. Kluwer: Hingham, MA, July
-
Hacigumus, H. and Mehrotra, S. Performance-conscious key management in encrypted databases. In Proceedings of the IFIP Database Security Conference, Sitges, Spain, Eds. C. Farkas and P. Samarati. Kluwer: Hingham, MA, July 2004.
-
(2004)
Proceedings of the IFIP Database Security Conference
-
-
Hacigumus, H.1
Mehrotra, S.2
-
438
-
-
79551602978
-
-
The semantic Web. Scientific American, May
-
Berners Lee, T. et al. The semantic Web. Scientific American, May 2001.
-
(2001)
-
-
Berners Lee, T.1
-
439
-
-
85055466016
-
-
RDF Primer
-
RDF Primer. Available at http://www.w3.org/TR/rdf-primer/.
-
-
-
-
442
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B. et al. Design and implementation of a database inference controller. Data and Knowledge Engineering Journal 11: 3, 1993.
-
(1993)
Data and Knowledge Engineering Journal
, vol.11
, pp. 3
-
-
Thuraisingham, B.1
-
443
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. Security issues for federated database systems. Computers and Security 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
445
-
-
0036386924
-
Data and applications security: Developments and directions
-
Oxford, UK
-
Thuraisingham, B. Data and applications security: Developments and directions. In Proceedings of IEEE COMPSAC, Oxford, UK, 2002.
-
(2002)
Proceedings of IEEE COMPSAC
-
-
Thuraisingham, B.1
-
447
-
-
10444271317
-
Data mining, national security pri vacy, and civil liberties
-
Thuraisingham, B. Data mining, national security pri vacy, and civil liberties, ACM SIGKDD, 4: 2, 2003.
-
(2003)
ACM SIGKDD
, vol.4
, pp. 2
-
-
Thuraisingham, B.1
-
449
-
-
24644455920
-
Privacy constraint processing in a privacy enhanced database system
-
Thuraisingham, B. Privacy constraint processing in a privacy enhanced database system. Data and Knowledge Engineering Journal, 2005 (to appear).
-
(2005)
Data and Knowledge Engineering Journal
-
-
Thuraisingham, B.1
-
450
-
-
85055538702
-
-
Available at www.w3c.org.
-
-
-
-
451
-
-
85055591189
-
-
Available at http://xml.apache.org/security/.
-
-
-
-
452
-
-
85055553106
-
-
Available at http://www.w3.org/Signature/.
-
-
-
-
455
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E. et al. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and Systems Security 2: 1, 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, pp. 1
-
-
Bertino, E.1
-
458
-
-
85055583804
-
-
Digital rights management architectures
-
Digital rights management architectures. Available at http://www.dlib.org/dlib/june01/iannella/06iannella.html.
-
-
-
-
461
-
-
85055482745
-
Analyzing the safety of workflow authorization models
-
Chalidiki, Greece, July 1998. Kluwer: Hingham, MA
-
Huang, W. and Atluri, V. Analyzing the safety of workflow authorization models. In Proceedings of the IFIP Database Security Conference, Chalidiki, Greece, July 1998. Kluwer: Hingham, MA, 1999.
-
(1999)
Proceedings of the IFIP Database Security Conference
-
-
Huang, W.1
Atluri, V.2
-
462
-
-
0007909408
-
Knowledge management architecture
-
Ed. B. Thuraisingham, Auerbach: New York
-
Morey, D. Knowledge management architecture. In Handbook of Data Management, Ed. B. Thuraisingham, Auerbach: New York, 1998.
-
(1998)
Handbook of Data Management
-
-
Morey, D.1
-
463
-
-
0003509852
-
-
MIT Press: Cambridge, MA
-
Morey, D., Maybury, M., and Thuraisingham, B. (Eds.) Knowledge Management. MIT Press: Cambridge, MA, 2001.
-
(2001)
Knowledge Management
-
-
Morey, D.1
Maybury, M.2
Thuraisingham, B.3
-
465
-
-
1642601787
-
A fair-exchange E-commerce protocol with automated dispute resolution
-
Amsterdam, The Netherlands, August
-
Ray, I. et al. A fair-exchange E-commerce protocol with automated dispute resolution. In Proceedings of the IFIP Database Security Conference, Amsterdam, The Netherlands, August 2000.
-
(2000)
Proceedings of the IFIP Database Security Conference
-
-
Ray, I.1
-
468
-
-
85055558492
-
Object-oriented approac h to developing real-time infrastructure and data manager
-
Laguna Beach, CA, February
-
Bensley, E. et al. Object-oriented approac h to developing real-time infrastructure and data manager. In Proceedings of the IEEE Workshop on Object-Oriented Real-time Systems, Laguna Beach, CA, February 1996.
-
(1996)
Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems
-
-
Bensley, E.1
-
469
-
-
0030169905
-
Robust distributed computing and sensing algorithm
-
Brooks, R. and Iyengar, S.S. Robust distributed computing and sensing algorithm. IEEE Computer 29: 6, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 6
-
-
Brooks, R.1
Iyengar, S.S.2
-
471
-
-
0142103313
-
Security and privacy in sensor networks
-
Chan, H. and Perrig, A. Security and privacy in sensor networks. IEEE Computer 36: 10, 2003.
-
(2003)
IEEE Computer
, vol.36
, pp. 10
-
-
Chan, H.1
Perrig, A.2
-
472
-
-
0035278354
-
Scheduling and priority mapping for static real-time middleware
-
DiPippo, L. et al. Scheduling and priority mapping for static real-time middleware. Real-time Systems Journal 20: 2, 2001.
-
(2001)
Real-Time Systems Journal
, vol.20
, pp. 2
-
-
Dipippo, L.1
-
474
-
-
85055518631
-
-
MIT Total Data Quality Management Program
-
MIT Total Data Quality Management Program. Available at http://web.mit.edu/tdqm/www/index.shtml.
-
-
-
-
476
-
-
85055470269
-
Integration of real-time infrastructure, data manager, and tracker
-
Newport Beach, CA, February
-
Gates, M. et al. Integration of real-time infrastructure, data manager, and tracker. In Proceedings of the IEEE Workshop on Object-Oriented Real-time Systems (WORDS), Newport Beach, CA, February 1997.
-
(1997)
Proceedings of the IEEE Workshop on Object-Oriented Real-Time Systems (WORDS)
-
-
Gates, M.1
-
477
-
-
2542538052
-
Special issue on data mining and privacy
-
Gehrke, J. Special issue on data mining and privacy. SIGKDD Explorations, 4: 2, 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, pp. 2
-
-
Gehrke, J.1
-
478
-
-
85055519686
-
Data quality
-
Brussels, Belgium, 2001. Kluwer: Hingham, MA
-
Hughes, E. and Thuraisingham, B. Data quality. In Proceedings of the IFIP Integrity and Control Conference, Brussels, Belgium, 2001. Kluwer: Hingham, MA, 2002.
-
(2002)
Proceedings of the IFIP Integrity and Control Conference
-
-
Hughes, E.1
Thuraisingham, B.2
-
481
-
-
85055527773
-
An adaptive policy for improved timeliness in secure database systems
-
Rensselaerville, New York, August 1995. Chapman & Hall: London
-
Son, S. et al. An adaptive policy for improved timeliness in secure database systems. In Proceedings of the Ninth IFIP Working Conference in Database Security, Rensselaerville, New York, August 1995. Chapman & Hall: London, 1996.
-
(1996)
Proceedings of the Ninth IFIP Working Conference in Database Security
-
-
Son, S.1
-
482
-
-
1542595336
-
STREAM: The Stanford stream data manager
-
Stanford Sensor Data Management Group. STREAM: The Stanford stream data manager. IEEE Data Engineering Bulletin 26: 1, 2003.
-
(2003)
IEEE Data Engineering Bulletin
, vol.26
, pp. 1
-
-
-
485
-
-
0036386924
-
Data and applications security: Developments and directions
-
Oxford, UK, August
-
Thuraisingham, B. Data and applications security: Developments and directions. In Proceedings of the IEEE COMPSAC Conference, Oxford, UK, August 2002.
-
(2002)
Proceedings of the IEEE COMPSAC Conference
-
-
Thuraisingham, B.1
-
486
-
-
10444271317
-
Data mining, national security, privacy and civil liberties
-
Thuraisingham, B. Data mining, national security, privacy and civil liberties. SIGKDD Explorations, 4: 2, 2003.
-
(2003)
SIGKDD Explorations
, vol.4
, pp. 2
-
-
Thuraisingham, B.1
-
489
-
-
85055587299
-
Security and privacy for sensor databases
-
Thuraisingham, B. Security and privacy for sensor databases. Sensor Letters, 2: 1, 2004.
-
(2004)
Sensor Letters
, vol.2
, pp. 1
-
-
Thuraisingham, B.1
-
491
-
-
77954107830
-
Secure database systems
-
Eds. Piatini, O. and Diaz, O. Artech: London, UK
-
Ferrari, E. and Thuraisingham, B. Secure database systems. In Advances in Databases, Eds. Piatini, O. and Diaz, O. Artech: London, UK, 2000.
-
(2000)
Advances in Databases
-
-
Ferrari, E.1
Thuraisingham, B.2
-
492
-
-
85008002483
-
-
IEEE Spectrum, 41: 7, 2004.
-
(2004)
IEEE Spectrum
, vol.41
, Issue.7
-
-
-
494
-
-
14344259059
-
Energ y and rate based MAC protocol for wireless sensor networks
-
Kannan, R. et al. Energ y and rate based MAC protocol for wireless sensor networks. ACM SIGMOD Record 32: 4, 2003.
-
(2003)
ACM SIGMOD Record
, vol.32
, pp. 4
-
-
Kannan, R.1
-
495
-
-
1642579901
-
Public telephone network vulnerabilities
-
Lake Niagara, Canada, July 2001. Kluwer: Hingham, MA
-
Lorenz, G. et al. Public telephone network vulnerabilities. In Proceedings of the IFIP Data and Applications Security Conference, Lake Niagara, Canada, July 2001. Kluwer: Hingham, MA, 2002.
-
(2002)
Proceedings of the IFIP Data and Applications Security Conference
-
-
Lorenz, G.1
-
496
-
-
85055532478
-
Security issues in mobile database access
-
Chalkidiki, Greece, July 1998. Kluwer: Hingham, MA
-
Lubinski, A. Security issues in mobile database access. In Proceedings of the IFIP Database Security Conference, Chalkidiki, Greece, July 1998. Kluwer: Hingham, MA, 1999.
-
(1999)
Proceedings of the IFIP Database Security Conference
-
-
Lubinski, A.1
-
498
-
-
85055547421
-
Security in wireless sensor netw orks
-
Perrig, A. et al. Security in wireless sensor netw orks. Communications of the ACM, 47: 6, 2004.
-
(2004)
Communications of the ACM
, vol.47
, pp. 6
-
-
Perrig, A.1
-
499
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B. Security issues for federated database systems, Computers and Security, 13: 6, 1994.
-
(1994)
Computers and Security
, vol.13
, pp. 6
-
-
Thuraisingham, B.1
-
502
-
-
85055587299
-
Security and privacy for sensor databases
-
Thuraisingham, B. Security and privacy for sensor databases. Sensor Letters, 1: 2, 2004.
-
(2004)
Sensor Letters
, vol.1
, pp. 2
-
-
Thuraisingham, B.1
-
504
-
-
85055471689
-
-
Biometrics
-
Biometrics. Available at http://biometrics.cse.msu.edu/info.html.
-
-
-
-
505
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
Chan, P. et al. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems 14: 6, 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, pp. 6
-
-
Chan, P.1
-
507
-
-
85055539526
-
-
Digital forensic
-
Digital forensics. Available at http://www.forensics.nl/links/.
-
-
-
-
508
-
-
85055541729
-
-
Digital identity
-
Digital identity. Available at http://www.pingidentity.com/index.php?cid=whyfederate.
-
-
-
-
509
-
-
85055541038
-
-
Digital watermarking
-
Digital watermarking. Available at http://www.watermarkingworld.org/.
-
-
-
-
510
-
-
85055569902
-
-
Available at http://www.sims.berkeley.edu/resources/affiliates/workshops/econsecurity/.
-
-
-
-
512
-
-
85055569855
-
-
Identity theft
-
Identity theft. Available at http://www.identitytheft911.com/index.jsp.
-
-
-
-
517
-
-
85055573977
-
-
Available at http://www.security-risk-analysis.com/.
-
-
-
-
519
-
-
85055503439
-
-
Steganography
-
Steganography. Available at http://www.jjtc.com/Steganography/.
-
-
-
-
521
-
-
85055522378
-
Special issue on heterogeneous database systems
-
Special issue on heterogeneous database systems. ACM Computing Surveys, 22: 3, 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, pp. 3
-
-
-
523
-
-
0014797273
-
A relational model of data for large shared data banks
-
Codd, E.F. A relational model of data for large shared data banks. Communications of the ACM 13: 6 (June) 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.6
-
-
Codd, E.F.1
-
524
-
-
0004154170
-
-
Addison- Wesley: Reading, MA, 1990 (6th edition published in 1995 b y Addison- Wesley)
-
Date, C.J. An Introduction to Database Management Systems. Addison- Wesley: Reading, MA, 1990 (6th edition published in 1995 b y Addison- Wesley).
-
An Introduction to Database Management Systems
-
-
Date, C.J.1
-
527
-
-
85055576383
-
Next generation database systems
-
Next generation database systems. ACM SIGMOD Record, 19: 4, 1990.
-
(1990)
ACM SIGMOD Record
, vol.19
, pp. 4
-
-
|