Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel Security Transaction Processing., , , , and . J. Comput. Secur., 9 (3): 165-195 (2001)Autonomy and Confidentiality: Secure Federated Data Management., , , , and . NGITS, (1995)Beyond the Pale of MAC and DAC-Defining New Forms of Access Control., , and . S&P, page 190-200. IEEE Computer Society, (1990)Application-Level Isolation Using Data Inconsistency Detection., , and . ACSAC, page 119-126. IEEE Computer Society, (1999)Surviving Information Warfare Attacks., , and . Computer, 32 (4): 57-63 (1999)Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases., , and . DBSec, volume A-47 of IFIP Transactions, page 109-121. North-Holland, (1993)Multilevel Secure Transaction Processing: Status and Prospects., , , , and . DBSec, volume 79 of IFIP Conference Proceedings, page 79-98. Chapman & Hall, (1996)Flexible Security Policies for Digital Libraries., , and . ACM Comput. Surv., 28 (4es): 110 (1996)Panel Discussion: Security for Distributed Database Management Systems.. DBSec, volume A-21 of IFIP Transactions, page 143-148. North-Holland, (1992)A model of atomicity for multilevel transactions., , , and . S&P, page 120-134. IEEE Computer Society, (1993)