Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture (English)
National licence
- New search for: Thomas, Roshan K.
- New search for: Sandhu, Ravi S.
- New search for: Thomas, Roshan K.
- New search for: Sandhu, Ravi S.
In:
Computer Security — ESORICS 94
;
403-428
;
1994
- Article/Chapter (Book) / Electronic Resource
-
Title:Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture
-
Contributors:Thomas, Roshan K. ( author ) / Sandhu, Ravi S. ( author )
-
Published in:Computer Security — ESORICS 94 ; 403-428Lecture Notes in Computer Science ; 875 ; 403-428
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:1994-01-01
-
Size:26 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Valuation of trust in open networksBeth, Thomas / Borcherding, Malte / Klein, Birgit et al. | 1994
- 19
-
Security versus performance requirements in data communication systemsZorkadis, Vasilios et al. | 1994
- 31
-
Non-interference through determinismRoscoe, A. W. / Woodcock, J. C. P. / Wulf, L. et al. | 1994
- 55
-
Compile-time detection of information flow in sequential programsBanâtre, Jean-Pierre / Bryce, Ciarán / Métayer, Daniel et al. | 1994
- 75
-
Security through type analysisO'Halloran, C. / Sennett, C. T. et al. | 1994
- 91
-
Designing secure key exchange protocolsBoyd, Colin / Mao, Wenbo et al. | 1994
- 107
-
Robust and secure password and key change methodHauser, Ralf / Janson, Philippe / Molva, Refik / Tsudik, Gene / Herreweghen, Els et al. | 1994
- 123
-
Beacon based authenticationJiwa, Azad / Seberry, Jennifer / Zheng, Yuliang et al. | 1994
- 143
-
Authentication via multi-service tickets in the Kuperee serverHardjono, Thomas / Seberry, Jennifer et al. | 1994
- 161
-
Oblivious signaturesChen, Lidong et al. | 1994
- 173
-
A calculus for secure channel establishment in open networksMaurer, Ueli M. / Schmid, Pierre E. et al. | 1994
- 193
-
On strengthening authentication protocols to foil cryptanalysisMao, Wenbo / Boyd, Colin et al. | 1994
- 205
-
An efficient electronic payment system protecting privacyCamenisch, Jan L. / Piveteau, Jean-Marc / Stadler, Markus A. et al. | 1994
- 217
-
The ESPRIT project CAFE —High security digital payment systemsBoly, Jean-Paul / Bosselaers, Antoon / Cramer, Ronald / Michelsen, Rolf / Mjølsnes, Stig / Muller, Frank / Pedersen, Torben / Pfitzmann, Birgit / Rooij, Peter / Schoenmakers, Berry et al. | 1994
- 231
-
Liability and computer security: Nine principlesAnderson, Ross J. et al. | 1994
- 247
-
Implementing secure dependencies over a network by designing a distributed security subsystemd'Ausbourg, Bruno et al. | 1994
- 267
-
A secure medium access control protocol: Security versus performancesSiron, Pierre / d'Ausbourg, Bruno et al. | 1994
- 281
-
Distributed file system over a multilevel secure architecture problems and solutionsCalas, Christel et al. | 1994
- 299
-
On the expressive power of the unary transformation modelSandhu, Ravi S. / Ganta, Srinivas et al. | 1994
- 319
-
Privilege graph: An extension to the typed access matrix modelDacier, Marc / Deswarte, Yves et al. | 1994
- 335
-
A consideration of the modes of operation for secure systemsRobinson, C. L. / Wiseman, S. R. et al. | 1994
- 357
-
Mark-and-sweep garbage collection in multilevel secure object-oriented database systemsCiampichetti, Alessandro / Bertino, Elisa / Mancini, Luigi et al. | 1994
- 375
-
Decomposition of multilevel objects in an object-oriented databaseBoulahia-Cuppens, N. / Cuppens, F. / Gabillon, A. / Yazdanian, K. et al. | 1994
- 403
-
Supporting object-based high-assurance write-up in multilevel databases for the replicated architectureThomas, Roshan K. / Sandhu, Ravi S. et al. | 1994
- 429
-
Aggregation in relational databases: Controlled disclosure of sensitive informationMotro, Amihai / Marks, Donald G. / Jajodia, Sushil et al. | 1994
- 447
-
Information flow controls vs inference controls: An integrated approachCuppens, F. / Trouessin, G. et al. | 1994