Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-16
|
Results: 16
Flexible support for multiple access control policies
Authors:
Jajodia, S Samarati, P Sapino, ML Subrahmanian, VS
Citation:
S. Jajodia et al., Flexible support for multiple access control policies, ACM T DATAB, 26(2), 2001, pp. 214-260
Avoiding loss of fairness owing to failures in fair data exchange systems
Authors:
Liu, P Ning, P Jajodia, S
Citation:
P. Liu et al., Avoiding loss of fairness owing to failures in fair data exchange systems, DECIS SUP S, 31(3), 2001, pp. 337-350
ADAM: A testbed for exploring the use of data mining in intrusion detection
Authors:
Barbara, D Couto, J Jajodia, S Wu, NN
Citation:
D. Barbara et al., ADAM: A testbed for exploring the use of data mining in intrusion detection, SIG RECORD, 30(4), 2001, pp. 15-24
ASEP: A secure and flexible commit protocol for MLS distributed database systems
Authors:
Ray, I Mancini, LV Jajodia, S Bertino, E
Citation:
I. Ray et al., ASEP: A secure and flexible commit protocol for MLS distributed database systems, IEEE KNOWL, 12(6), 2000, pp. 880-899
Secure databases: Constraints, inference channels, and monitoring disclosures
Authors:
Brodsky, A Farkas, C Jajodia, S
Citation:
A. Brodsky et al., Secure databases: Constraints, inference channels, and monitoring disclosures, IEEE KNOWL, 12(6), 2000, pp. 900-919
Flexible transaction dependencies in database systems
Authors:
Mancini, LV Ray, I Jajodia, S Bertino, E
Citation:
Lv. Mancini et al., Flexible transaction dependencies in database systems, DIST PARALL, 8(4), 2000, pp. 399-446
Rewriting histories: Recovering from malicious transactions
Authors:
Liu, P Ammann, P Jajodia, S
Citation:
P. Liu et al., Rewriting histories: Recovering from malicious transactions, DIST PARALL, 8(1), 2000, pp. 7-40
Modeling requests among cooperating intrusion detection systems
Authors:
Ning, P Wang, XS Jajodia, S
Citation:
P. Ning et al., Modeling requests among cooperating intrusion detection systems, COMPUT COMM, 23(17), 2000, pp. 1702-1715
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity
Authors:
Ray, I Ammann, P Jajodia, S
Citation:
I. Ray et al., Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity, INF SCI, 129(1-4), 2000, pp. 155-195
Turing Award winner Jim Gray on the new millenium
Authors:
Jajodia, S
Citation:
S. Jajodia, Turing Award winner Jim Gray on the new millenium, IEEE CONCUR, 7(3), 1999, pp. 9-10
Data replication gaining popularity
Authors:
Jajodia, S
Citation:
S. Jajodia, Data replication gaining popularity, IEEE CONCUR, 7(2), 1999, pp. 85-86
Computer security, fault tolerance, and software assurance
Authors:
Ammann, P Jajodia, S
Citation:
P. Ammann et S. Jajodia, Computer security, fault tolerance, and software assurance, IEEE CONCUR, 7(1), 1999, pp. 4-6
A flexible authorization mechanism for relational data management systems
Authors:
Bertino, E Jajodia, S Samarati, P
Citation:
E. Bertino et al., A flexible authorization mechanism for relational data management systems, ACM T INF S, 17(2), 1999, pp. 101-140
Scalable threshold closure
Authors:
Zhang, CR Lam, KY Jajodia, S
Citation:
Cr. Zhang et al., Scalable threshold closure, THEOR COMP, 226(1-2), 1999, pp. 185-206
Surviving information warfare attacks
Authors:
Jajodia, S Ammann, P McCollum, CD
Citation:
S. Jajodia et al., Surviving information warfare attacks, COMPUTER, 32(4), 1999, pp. 57
Trusted recovery
Authors:
Jajodia, S McCollum, CD Ammann, P
Citation:
S. Jajodia et al., Trusted recovery, COMM ACM, 42(7), 1999, pp. 71-75
Risultati:
1-16
|