Author of the publication

Intrusion Confinement by Isolation in Information Systems

, , and . Proceedings of IFIP Workshop on Database Security, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel Security Transaction Processing., , , , and . J. Comput. Secur., 9 (3): 165-195 (2001)Autonomy and Confidentiality: Secure Federated Data Management., , , , and . NGITS, (1995)Beyond the Pale of MAC and DAC-Defining New Forms of Access Control., , and . S&P, page 190-200. IEEE Computer Society, (1990)Application-Level Isolation Using Data Inconsistency Detection., , and . ACSAC, page 119-126. IEEE Computer Society, (1999)Intrusion Confinement by Isolation in Information Systems, , and . Proceedings of IFIP Workshop on Database Security, (1999)Benchmarking multilevel secure database systems using the MITRE benchmark., , , and . ACSAC, page 86-95. IEEE, (1994)Distributed Concurrency Control with Optional Data Replication., and . DBSec, volume A-6 of IFIP Transactions, page 149-172. North-Holland, (1991)Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management., , and . J. Comput. Secur., 3 (2/3): 207-230 (1995)Application-Level Isolation to Cope with Malicious Database Users., , and . ACSAC, page 73-82. IEEE Computer Society, (1998)Surviving Information Warfare Attacks., , and . Computer, 32 (4): 57-63 (1999)