Sciweavers

DBSEC
2000
95views Database» more  DBSEC 2000»
14 years 24 days ago
Wrappers - a mechanism to support state-based authorisation in Web applications
The premises of this paper are 1) security is application dependent because application semantics directly influence proper protection; but 2) applications are generally too compl...
Martin S. Olivier, Ehud Gudes
DBSEC
2000
112views Database» more  DBSEC 2000»
14 years 24 days ago
Coordinating Policy for Federated Applications
Abstract At the start of its present term of office in 1997 the UK government published a planning document promising ubiquitous access to Electronic Health Records (EHRs) held wit...
Ken Moody
DBSEC
2000
110views Database» more  DBSEC 2000»
14 years 24 days ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
DBSEC
2000
138views Database» more  DBSEC 2000»
14 years 24 days ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
DBSEC
2000
153views Database» more  DBSEC 2000»
14 years 24 days ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
DBSEC
2000
117views Database» more  DBSEC 2000»
14 years 24 days ago
Database Security 2000
Database systems are being more and more used, with larger sized databases, and as components of very complex systems, that include numerous protocols. Database security problems ...
John R. Campbell
DBSEC
2000
111views Database» more  DBSEC 2000»
14 years 24 days ago
Authentic Third-party Data Publication
Premkumar T. Devanbu, Michael Gertz, Charles U. Ma...
DBSEC
1998
115views Database» more  DBSEC 1998»
14 years 24 days ago
Secure Mediation: Requirements and Design
In this paper1 we discuss the security requirements for mediation, and present our approach towards satisfying them, with an emphasis on con dentiality and authenticity. Furthermo...
Joachim Biskup, Ulrich Flegel, Yücel Karabulu...
DBSEC
2003
155views Database» more  DBSEC 2003»
14 years 25 days ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
DBSEC
2003
149views Database» more  DBSEC 2003»
14 years 25 days ago
Anti-Tamper Databases: Querying Encrypted Databases
With mobile computing and powerful laptops, databases with sensitive data can be physically retrieved by malicious users who can employ techniques that were not previously thought...
Gultekin Özsoyoglu, David A. Singer, Sun S. C...