Author of the publication

Achieving stricter correctness requirements in multilevel secure databases.

, , and . S&P, page 135-147. IEEE Computer Society, (1993)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors., , , and . Serv. Oriented Comput. Appl., 12 (2): 123-135 (2018)Polyinstantation for Cover Stories., and . ESORICS, volume 648 of Lecture Notes in Computer Science, page 307-328. Springer, (1992)Globally Consistent Event Ordering in One-Directional Distributed Environments., , and . IEEE Trans. Parallel Distributed Syst., 7 (6): 665-670 (1996)Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks., , , and . CoRR, (2020)Satisfiability of Quantitative Temporal Constraints with Multiple Granularities., , and . CP, volume 1330 of Lecture Notes in Computer Science, page 435-449. Springer, (1997)Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information., , and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 431-445. Springer, (1994)Trusted Recovery., , and . Commun. ACM, 42 (7): 71-75 (1999)A Flexible Authorization Mechanism for Relational Data Management Systems., , and . ACM Trans. Inf. Syst., 17 (2): 101-140 (1999)An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads., and . ACM Conference on Computer and Communications Security, page 118-125. ACM, (1994)A propositional policy algebra for access control., and . ACM Trans. Inf. Syst. Secur., 6 (2): 286-325 (2003)