1–20 of 24 hits

Sort by: Relevancy | Date newest | Title A-Z

  1.  

    Minimum-cost network hardening using attack graphs

    Wang, Lingyu / Noel, S. / Jajodia, S. | Tema Archive | 2006
    Keywords: Datensicherheit
  2.  

    Enhancing the controlled disclosure of sensitive information

    Marks, D.G. / Motro, A. / Jajodia, S. | Tema Archive | 1996
    Keywords: Datensicherheit
  3.  

    An advanced commit protocol for MLS distributed database systems

    Ray, I. / Bertino, E. / Jajodia, S. et al. | Tema Archive | 1996
    Keywords: Datensicherheit
  4.  

    Detecting VoIP floods using the Hellinger distance

    Sengar, H. / Wang, Haining / Wijesekera, D. et al. | Tema Archive | 2008
    Keywords: Datensicherheit
  5.  

    Surviving information warfare attacks

    Jajodia, S. / Ammann, P. / McCollum, C.D. | Tema Archive | 1999
    Keywords: Datensicherheit
  6.  

    Rethinking integrity (distributed databases)

    Ammann, P. / Jajodia, S. | Tema Archive | 1997
    Keywords: Datensicherheit
  7.  

    A time stamp ordering algorithm for secure, single-version, multi-level databases

    Ammann, P. / Jajodia, S. | Tema Archive | 1992
    Keywords: DATENSICHERHEIT
  8.  

    Authentication and integrity in telecommunication signaling network

    Sengar, H. / Wijesekera, D. / Jajodia, S. | Tema Archive | 2005
    Keywords: Datensicherheit
  9.  

    Benchmarking multilevel secure database systems using the MITRE benchmark

    Doshi, V.M. / Herndon, W.R. / Jajodia, S. et al. | Tema Archive | 1994
    Keywords: Datensicherheit
  10.  

    Aggregation in relational databases: controlled disclosure of sensitive information

    Motro, A. / Marks, D.G. / Jajodia, S. | Tema Archive | 1994
    Keywords: Datensicherheit
  11.  

    Secure dynamic fragment and replica allocation in large-scale distributed file systems

    Mei, A. / Mancini, L.V. / Jajodia, S. | Tema Archive | 2003
    Keywords: Datensicherheit
  12.  

    Propagation of authorizations in distributed database systems

    Samarati, P. / Ammann, P. / Jajodia, S. | Tema Archive | 1994
    Keywords: Datensicherheit
  13.  

    Trusted recovery

    Jajodia, S. / McCollum, C.D. / Ammann, P. | Tema Archive | 1999
    Keywords: Datensicherheit
  14.  

    Exploring steganography: seeing the unseen

    Johnson, N.F. / Jajodia, S. | Tema Archive | 1998
    Keywords: Datensicherheit
  15.  

    Why security is needed (Information Network Systems)

    Saito, T. | Tema Archive | 1986
    Keywords: DATENSICHERHEIT
  16.  

    Transaction processing in multilevel-secure databases using replicated architecture

    Jajodia, S. / Kogan, B. | Tema Archive | 1990
    Keywords: DATENSICHERHEIT
  17.  

    Update semantics for multilevel relations

    Jajodia, S. / Sandhu, R. / Sibley, E. | Tema Archive | 1990
    Keywords: DATENSICHERHEIT
  18.  

    A formal framework for single level decomposition of multilevel relations

    Jajodia, S. / Sandhu, R. | Tema Archive | 1990
    Keywords: DATENSICHERHEIT
  19.  

    Integrating an object-oriented data model with multilevel security

    Jajodia, S. / Kogan, B. | Tema Archive | 1990
    Keywords: DATENSICHERHEIT
  20.  

    Maintaining correctness, availability, and unambiguity in trusted database management systems

    Meadows, C. / Jajodia, S. | Tema Archive | 1988
    Keywords: DATENSICHERHEIT

Number of results: 10 | 20 | 50

Feedback