54 results on '"Spooner, David"'
Search Results
2. Report of discussion sessions following presentations
3. Workshop Summary
4. Systematics, Diversity, Genetics, and Evolution of Wild and Cultivated Potatoes
5. Erratum to: Database and Application Security XV
6. Security Procedures for Classification Mining Algorithms
7. Panel on XML and Security
8. An Extended Transaction Model Approach for Multilevel Secure Transaction Processing
9. Managing Classified Documents in a Relational Database
10. Regulating Access to XML Documents
11. Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System
12. The Inference Problem and Updates in Relational Databases
13. Public Telephone Network Vulnerabilities
14. ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications
15. A Comparison Between ConSA and Current Linux Security Implementations
16. A Novel Approach to Certificate Revocation Management
17. Flexible Security Policies in SQL
18. Administering Permissions for Distributed Data: Factoring and Automated Inference
19. Reorganization of the Database Log for Information Warfare Data Recovery
20. Randomly Roving Agents for Intrusion Detection
21. State-Dependent Security Decisions for Distributed Object-Systems
22. Efficient Damage Assessment and Repair in Resilient Distributed Database Systems
23. Subject Switching Algorithms for Access Control in Federated Databases
24. Secure Role-Based Workflow Models
25. Constraints-Based Access Control
26. Recent Advances in Access Control Models
27. Role-Based Access Control on the Web Using LDAP
28. Customer Requirements for Security in Relational Database Management
29. Argos — A Configurable Access Control System for Interoperable Environments
30. Assured Discretionary Access Control for Trusted RDBMS
31. A formal security design approach for information exchange in organisations
32. ILIAD: An Integrated Laboratory for Inference Analysis and Detection
33. Inference Analysis During Multilevel Database Design
34. A Tool for Inference Detection and Knowledge Discovery in Databases
35. Panel Discussion: Role-based Access Control and Next-Generation Security Models
36. Providing different degrees of recency options to transactions in multilevel secure databases
37. A secure concurrency control protocol for real-time databases
38. An Adaptive Policy for Improved Timeliness in Secure Database Systems
39. Toward a MAC policy framework
40. Modeling Mandatory Access Control in Role-Based Security Systems
41. A Locking Protocol for MLS Databases Providing Support For Long Transactions
42. Multilevel Data Model for the Trusted ONTOS Prototype
43. Modelling a Multilevel Database with Temporal Downgrading Functionalities
44. A formal specification of an authorization model for object-oriented databases
45. URBS Enforcement Mechanisms for Object-Oriented Systems
46. The Modulated-Input Modulated-Output Model
47. Self-protecting Objects in a Secure Federated Database
48. Security and Data Mining
49. Storage Jamming
50. How Secure is Secure: Some Thoughts on Security Metrics
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.