AAAAAA

   
Results: 1-16 |
Results: 16

Authors: Jajodia, S Samarati, P Sapino, ML Subrahmanian, VS
Citation: S. Jajodia et al., Flexible support for multiple access control policies, ACM T DATAB, 26(2), 2001, pp. 214-260

Authors: Liu, P Ning, P Jajodia, S
Citation: P. Liu et al., Avoiding loss of fairness owing to failures in fair data exchange systems, DECIS SUP S, 31(3), 2001, pp. 337-350

Authors: Barbara, D Couto, J Jajodia, S Wu, NN
Citation: D. Barbara et al., ADAM: A testbed for exploring the use of data mining in intrusion detection, SIG RECORD, 30(4), 2001, pp. 15-24

Authors: Ray, I Mancini, LV Jajodia, S Bertino, E
Citation: I. Ray et al., ASEP: A secure and flexible commit protocol for MLS distributed database systems, IEEE KNOWL, 12(6), 2000, pp. 880-899

Authors: Brodsky, A Farkas, C Jajodia, S
Citation: A. Brodsky et al., Secure databases: Constraints, inference channels, and monitoring disclosures, IEEE KNOWL, 12(6), 2000, pp. 900-919

Authors: Mancini, LV Ray, I Jajodia, S Bertino, E
Citation: Lv. Mancini et al., Flexible transaction dependencies in database systems, DIST PARALL, 8(4), 2000, pp. 399-446

Authors: Liu, P Ammann, P Jajodia, S
Citation: P. Liu et al., Rewriting histories: Recovering from malicious transactions, DIST PARALL, 8(1), 2000, pp. 7-40

Authors: Ning, P Wang, XS Jajodia, S
Citation: P. Ning et al., Modeling requests among cooperating intrusion detection systems, COMPUT COMM, 23(17), 2000, pp. 1702-1715

Authors: Ray, I Ammann, P Jajodia, S
Citation: I. Ray et al., Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity, INF SCI, 129(1-4), 2000, pp. 155-195

Authors: Jajodia, S
Citation: S. Jajodia, Turing Award winner Jim Gray on the new millenium, IEEE CONCUR, 7(3), 1999, pp. 9-10

Authors: Jajodia, S
Citation: S. Jajodia, Data replication gaining popularity, IEEE CONCUR, 7(2), 1999, pp. 85-86

Authors: Ammann, P Jajodia, S
Citation: P. Ammann et S. Jajodia, Computer security, fault tolerance, and software assurance, IEEE CONCUR, 7(1), 1999, pp. 4-6

Authors: Bertino, E Jajodia, S Samarati, P
Citation: E. Bertino et al., A flexible authorization mechanism for relational data management systems, ACM T INF S, 17(2), 1999, pp. 101-140

Authors: Zhang, CR Lam, KY Jajodia, S
Citation: Cr. Zhang et al., Scalable threshold closure, THEOR COMP, 226(1-2), 1999, pp. 185-206

Authors: Jajodia, S Ammann, P McCollum, CD
Citation: S. Jajodia et al., Surviving information warfare attacks, COMPUTER, 32(4), 1999, pp. 57

Authors: Jajodia, S McCollum, CD Ammann, P
Citation: S. Jajodia et al., Trusted recovery, COMM ACM, 42(7), 1999, pp. 71-75
Risultati: 1-16 |