Author of the publication

Multilevel Secure Transaction Processing: Status and Prospects.

, , , , and . DBSec, volume 79 of IFIP Conference Proceedings, page 79-98. Chapman & Hall, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel Security Transaction Processing., , , , and . J. Comput. Secur., 9 (3): 165-195 (2001)Autonomy and Confidentiality: Secure Federated Data Management., , , , and . NGITS, (1995)Application-Level Isolation Using Data Inconsistency Detection., , and . ACSAC, page 119-126. IEEE Computer Society, (1999)Beyond the Pale of MAC and DAC-Defining New Forms of Access Control., , and . S&P, page 190-200. IEEE Computer Society, (1990)Distributed Concurrency Control with Optional Data Replication., and . DBSec, volume A-6 of IFIP Transactions, page 149-172. North-Holland, (1991)Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management., , and . J. Comput. Secur., 3 (2/3): 207-230 (1995)Benchmarking multilevel secure database systems using the MITRE benchmark., , , and . ACSAC, page 86-95. IEEE, (1994)Intrusion Confinement by Isolation in Information Systems, , and . Proceedings of IFIP Workshop on Database Security, (1999)Application-Level Isolation to Cope with Malicious Database Users., , and . ACSAC, page 73-82. IEEE Computer Society, (1998)Multilevel Secure Transaction Processing: Status and Prospects., , , , and . DBSec, volume 79 of IFIP Conference Proceedings, page 79-98. Chapman & Hall, (1996)