Author of the publication

Field Level Classification and SQL.

. DBSec, volume A-60 of IFIP Transactions, page 247-258. North-Holland, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Information Security Risks: Policy for Protection Through to Implementation., and . ECIW, page 129-140. Academic Conferences Limited, Reading, UK, (2005)Providing security in a phone book database using triggers., , and . ACSAC, page 85-96. IEEE, (1992)Control of confidentiality in databases.. Comput. Secur., 9 (6): 529-537 (1990)A Consideration of the Modes of Operation for Secure Systems., and . ESORICS, volume 875 of Lecture Notes in Computer Science, page 335-356. Springer, (1994)Variety of papers introduces specialized computers: L Snyder, L H Jamieson, D B Gannon and H J Siegel (Eds)'Algorithmically specialized parallel computers' Academic Press, Orlando, FL, USA (1985) £24.00 pp xiii + 252.. Microprocess. Microsystems, 10 (4): 230 (1986)The trusted path between SMITE and the user., , , and . S&P, page 146-155. IEEE Computer Society, (1988)A "New" Security Policy Model., and . S&P, page 215-228. IEEE Computer Society, (1989)Simple Assured Bastion Hosts., and . ACSAC, page 24-33. IEEE Computer Society, (1997)Using SWORD for the Military Aircraft Command Example Database.. DBSec, volume A-21 of IFIP Transactions, page 73-90. North-Holland, (1992)Abstract and Concrete Models for Secure Database Applications.. DBSec, volume A-6 of IFIP Transactions, page 239-273. North-Holland, (1991)