57 results on '"Spooner, David"'
Search Results
2. Carrot Organelle Genomes: Organization, Diversity, and Inheritance
3. Selected Summary of Discussions
4. Solanum sect. Lycopersicon
5. Report of discussion sessions following presentations
6. Radiotherapy in Upper GI Tract Neoplasms
7. Workshop Summary
8. A view on implementing processes: Categories of circuits
9. Towards an Object-Oriented Data Model for a Mechanical CAD Database System
10. Erratum to: Database and Application Security XV
11. Rose: An object-oriented database system for interactive computer graphics applications
12. Security Procedures for Classification Mining Algorithms
13. Panel on XML and Security
14. An Extended Transaction Model Approach for Multilevel Secure Transaction Processing
15. Managing Classified Documents in a Relational Database
16. Regulating Access to XML Documents
17. Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System
18. The Inference Problem and Updates in Relational Databases
19. Public Telephone Network Vulnerabilities
20. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications
21. A Comparison Between ConSA and Current Linux Security Implementations
22. A Novel Approach to Certificate Revocation Management
23. Flexible Security Policies in SQL
24. Administering Permissions for Distributed Data: Factoring and Automated Inference
25. Reorganization of the Database Log for Information Warfare Data Recovery
26. Randomly Roving Agents for Intrusion Detection
27. State-Dependent Security Decisions for Distributed Object-Systems
28. Efficient Damage Assessment and Repair in Resilient Distributed Database Systems
29. Subject Switching Algorithms for Access Control in Federated Databases
30. Secure Role-Based Workflow Models
31. Constraints-Based Access Control
32. Recent Advances in Access Control Models
33. Role-Based Access Control on the Web Using LDAP
34. Customer Requirements for Security in Relational Database Management
35. Argos — A Configurable Access Control System for Interoperable Environments
36. Assured Discretionary Access Control for Trusted RDBMS
37. A formal security design approach for information exchange in organisations
38. ILIAD: An Integrated Laboratory for Inference Analysis and Detection
39. Inference Analysis During Multilevel Database Design
40. A Tool for Inference Detection and Knowledge Discovery in Databases
41. Panel Discussion: Role-based Access Control and Next-Generation Security Models
42. Providing different degrees of recency options to transactions in multilevel secure databases
43. A secure concurrency control protocol for real-time databases
44. An Adaptive Policy for Improved Timeliness in Secure Database Systems
45. Toward a MAC policy framework
46. Modeling Mandatory Access Control in Role-Based Security Systems
47. A Locking Protocol for MLS Databases Providing Support For Long Transactions
48. Multilevel Data Model for the Trusted ONTOS Prototype
49. Modelling a Multilevel Database with Temporal Downgrading Functionalities
50. A formal specification of an authorization model for object-oriented databases
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.