Author of the publication

Abductive and Approximate Reasoning Models for Characterizing Inference Channels.

, , and . CSFW, page 118-126. IEEE Computer Society, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards a MAC Policy Framework., and . DBSec, volume 51 of IFIP Conference Proceedings, page 165-180. Chapman & Hall, (1995)Automated Instruction Detection.. Information Systems Security, 1 (4): 38-50 (1993)Access Control Policies for Database Systems.. DBSec, page 41-52. North-Holland, (1988)Real-time intrusion detection.. COMPCON, page 353-. IEEE Computer Society, (1989)Workshop Summary.. DBSec, volume A-21 of IFIP Transactions, page 387-396. North-Holland, (1992)Security Issues in Federated Database Systems: Panel Contributions., , , and . DBSec, volume A-6 of IFIP Transactions, page 131-148. North-Holland, (1991)Issues in distributed database security., , and . ACSAC, page 196-203. IEEE, (1989)Current Issues in Statistical Database Security.. DBSec, volume A-6 of IFIP Transactions, page 381-385. North-Holland, (1991)The SeaView Security Model., , , , and . IEEE Trans. Software Eng., 16 (6): 593-607 (1990)Security for object-oriented database systems., and . S&P, page 260-272. IEEE Computer Society, (1992)