|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 24 keywords
|
|
|
Results
Found 22 publication records. Showing 22 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
168 | Ravi S. Sandhu, Sushil Jajodia |
Polyinstantation for Cover Stories. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
77 | Shashi K. Gadia |
Applicability of Temporal Data Models to Query Multilevel Security Databases: A Case Study. |
Temporal Databases, Dagstuhl |
1997 |
DBLP DOI BibTeX RDF |
belief data, polyinstantiation, dimensional databases, Databases, relational databases, spatial databases, temporal databases, multilevel security |
53 | Ravi S. Sandhu, Fang Chen |
The Multilevel Relational (MLR) Data Model. |
ACM Trans. Inf. Syst. Secur. |
1998 |
DBLP DOI BibTeX RDF |
conidentiality, polyinstantiation, access control, multilevel security |
53 | Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark R. Heckman, William R. Shockley |
The SeaView Security Model. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
policy formalization, new data, SeaView security model, clearances, mandatory security, standard relational model, multilevel relations, discretionary security, application-independent properties, entity integrity, polyinstantiation integrity, classifications, software engineering, relational databases, security of data, users, labeling, data consistency, reference monitor, formal security model, referential integrity, derived data, multilevel database |
32 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
Polyinstantiation. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
32 | Nenad Jukic, Boris Jukic, Laurie Meamber, George S. Nezlek |
Implementing Polyinstantiation as a Strategy for Electronic Commerce Customer Relationship Management. |
Int. J. Electron. Commer. |
2002 |
DBLP DOI BibTeX RDF |
|
32 | Mikko T. Siponen |
Database Security and the Problem of Polyinstantiation: a moral scrutiny. |
Australas. J. Inf. Syst. |
2002 |
DBLP BibTeX RDF |
|
32 | Ravi S. Sandhu, Sushil Jajodia |
Eliminating polyinstantiation securely. |
Comput. Secur. |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Tsau Young Lin |
Attribute Based Data Model and Polyinstantiation. |
IFIP Congress (2) |
1992 |
DBLP BibTeX RDF |
|
32 | Claude Laferriere |
Predicate based polyinstantiation in multi-level secure DBMS. |
Comput. Secur. |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Teresa F. Lunt |
Polyinstantiation: An Inevitable Part of a Multilevel World. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Catherine Meadows 0001 |
Panel Discussion on the Polyinstantiation Problem: An Introduction. |
CSFW |
1991 |
DBLP BibTeX RDF |
|
32 | Dick O'Brien |
The LDV Approach to Polyinstantiation. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Sushil Jajodia |
Panel Discussion on the Polyinstantiation Problem: A Position Paper. |
CSFW |
1991 |
DBLP BibTeX RDF |
|
32 | Doug Nelson, Chip Paradise |
Using polyinstantiation to develop an MLS application. |
ACSAC |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt |
A New Polyinstantiation Integrity Constraint for Multilevel Relations. |
CSFW |
1990 |
DBLP DOI BibTeX RDF |
|
32 | Sushil Jajodia, Ravi S. Sandhu |
Polyinstantiation Integrity in Multilevel Relations Revisited. |
DBSec |
1990 |
DBLP BibTeX RDF |
|
32 | Sushil Jajodia, Ravi S. Sandhu |
Polyinstantiation Integrity in Multilevel Relations. |
S&P |
1990 |
DBLP DOI BibTeX RDF |
|
29 | Paul D. Stachour, Bhavani Thuraisingham |
Design of LDV: A Multilevel Secure Relational Database Management System. |
IEEE Trans. Knowl. Data Eng. |
1990 |
DBLP DOI BibTeX RDF |
classification level, polyinstantiation, type enforcement, multilevel secure relational database management system, secure database system, LDV, Lock Data Views, LOgical Coprocessing Kernel, assured pipelines, query processor, update processor, relational databases, operating system, aggregation, security policy, inference, security of data, LOCK, metadata management, Trusted Computing Base |
24 | Young-Hwan Oh, Hae-Young Bae |
Enhancing Spatial Database Access Control by Eliminating the Covert Topology Channel. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Lan Li, Xinghao Jiang, Jianhua Li 0001 |
Enforce Mandatory Access Control Policy on XML Documents. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Rae K. Burns, Yi-Fang Koh |
A Comparison of Multilevel Structured Query Language (SQL) Implementations. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #22 of 22 (100 per page; Change: )
|
|