Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Real-time intrusion detection.. COMPCON, page 353-. IEEE Computer Society, (1989)A MAC Policy Framework for Multilevel Relational Databases., and . IEEE Trans. Knowl. Data Eng., 8 (1): 3-15 (1996)Automated Instruction Detection.. Information Systems Security, 1 (4): 38-50 (1993)Access Control Policies for Database Systems.. DBSec, page 41-52. North-Holland, (1988)Views for Multilevel Database Security., , , , , , and . IEEE Trans. Software Eng., 13 (2): 129-140 (1987)Towards a MAC Policy Framework., and . DBSec, volume 51 of IFIP Conference Proceedings, page 165-180. Chapman & Hall, (1995)Security Issues in Federated Database Systems: Panel Contributions., , , and . DBSec, volume A-6 of IFIP Transactions, page 131-148. North-Holland, (1991)Element-level classification with A1 assurance., , , , and . Comput. Secur., 7 (1): 73-82 (1988)Workshop Summary.. DBSec, volume A-21 of IFIP Transactions, page 387-396. North-Holland, (1992)Multilevel Security for Object-Oriented Database Systems.. DBSec, page 199-209. North-Holland, (1989)