Abstract is missing.
- Protecting Information when Access is Granted for CollaborationGio Wiederhold. 1-14
- Author-X: A Java-Based System for XML Data ProtectionElisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti. 15-26
- A Fair-exchange E-commerce Protocol with Automated Dispute ResolutionIndrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy. 27-38
- XML Access Control Systems: A Component-Based ApproachErnesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati. 39-50
- A Configurable Security Architecture PrototypeAlexandre Hardy, Martin S. Olivier. 51-62
- Distributed Policies for Data Management Making Policies MobileSusan Chapin, Donald B. Faatz, Sushil Jajodia. 63-76
- Security Architecture of the Multimedia MediatorChristian Altenschmidt, Joachim Biskup, Yücel Karabulut. 77-88
- Simulation and Analysis of Cryptographic ProtocolsMauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi. 89-100
- Authentic Third-party Data PublicationPremkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine. 101-112
- Protecting File systems Against Corruption Using ChecksumsDaniel Barbará, Rajni Goel, Sushil Jajodia. 113-124
- Web Security and Privacy (Panel)Bhavani M. Thuraisingham. 125-126
- Coordinating Policy for Federated ApplicationsKen Moody. 127-134
- Integrating Security Policies in Federated Database SystemsMarta Oliva, Fèlix Saltor. 135-148
- Wrappers - a mechanism to support state-based authorisation in Web applicationsMartin S. Olivier, Ehud Gudes. 149-160
- An Integrated Framework for Database Privacy ProtectionLiWu Chang, Ira S. Moskowitz. 161-172
- Discovery of Multi-Level Security PoliciesChristina Yip Chung, Michael Gertz, Karl N. Levitt. 173-184
- Protecting Deductive Databases from Unauthorized RetrievalsSteve Barker. 185-196
- Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large OrganizationsMarc Donner, David Nochin, Dennis Shasha, Wendy Walasek. 195-316
- Confidentiality vs. Integrity in Secure DatabasesAdrian Spalka, Armin B. Cremers. 197-208
- Extending SQL s Grant and Revoke Operations, to Limit and Reactivate PrivilegesArnon Rosenthal, Edward Sciore. 209-220
- Language Extensions for Programmable SecurityJohn Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi. 221-232
- Protecting Privacy from Continuous High-resolution Satellite SurveillanceSoon Ae Chun, Vijayalakshmi Atluri. 233-244
- Database Security Integration using Role-Based Access ControlSylvia L. Osborn. 245-258
- Role-Based Security in a Distributed Resource EnvironmentSteven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr. 259-270
- WorkFlow Analyzed for Security and Privacy in using DatabasesWouter Teepe, Reind P. van de Riet, Martin S. Olivier. 271-282
- Identifying Security Holes in OLAP ApplicationsJürgen Steger, Holger Günzel, Andreas Bauer 0004. 283-294
- Database Security 2000John R. Campbell. 317-322
- Declarative Semantics of Belief Queries in MLS Deductive DatabasesHasan M. Jamil. 323-328
- Trust Management in Distributed DatabasesJames Bret Michael, Leonard T. Gaines. 329-338
- Active Access Control as High-Level ControlDaniel Cvrcek. 339-346
- Conference Key Agreement Protocol Using Oblivious TransferAri Moesriami Barmawi, Shingo Takada, Norihisa Doi. 347-354
- An Integration Model of Role-Based Access Control and Activity Based Access Control Using TaskSejong Oh, Seog Park. 355-360
- Access Control Model in Object-Oriented SystemsKeiji Izaki, Katsuya Tanaka, Makoto Takizawa. 361-366
- PanelReind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold. 373