Abstract is missing.
- Protecting Sensitive Medical InformationJeffrey G. Kaplan. 1-14
- Implementing the Message Filter Object-Oriented Security Model without Trusted SubjectsRoshan K. Thomas, Ravi S. Sandhu. 15-34
- Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data ModelsKenneth Smith, Marianne Winslett. 35-54
- The SPEAR Data Design MethodPeter J. Sell. 55-72
- Using SWORD for the Military Aircraft Command Example DatabaseSimon R. Wiseman. 73-90
- Extending Access Control with Duties - Realized by Active MechanismsDirk Jonscher. 91-112
- Formalizing and Validating Complex Security RequirementsPhilip Morris, John A. McDermid. 113-124
- Support for Security Modeling in Information Systems DesignGerhard Steinke, Matthias Jarke. 125-142
- Panel Discussion: Security for Distributed Database Management SystemsCatherine D. McCollum. 143-148
- Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel DatabasesThomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel. 149-168
- Inference and Cover StoriesLeonard J. Binns. 169-178
- Aerie: An Inference Modeling and Detection Approach for DatabasesThomas H. Hinke, Harry S. Delugach. 179-194
- Inference Through Secondary Path AnalysisLeonard J. Binns. 195-210
- Disclosure Limitation using Autocorrelated NoiseGeorge T. Duncan, Sumitra Mukherjee. 211-224
- Recovery Management for Multilevel Secure Database SystemsIwen E. Kang, Thomas F. Keefe. 225-248
- Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized ArchitectureOliver Costich, Sushil Jajodia. 249-266
- Orange Locking: Channel-Free Database Concurrency Control Via LockingJohn P. McDermott, Sushil Jajodia. 267-284
- A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database SystemMyong H. Kang, Oliver Costich, Judith N. Froscher. 285-300
- Tuple-level vs Element-level ClassificationXiaolei Qian, Teresa F. Lunt. 301-316
- Inference Secure Multilevel DatabasesTsau Young Lin. 317-332
- User-Role Based Security Profiles for an Object-Oriented Design ModelM.-Y. Hu, Steven A. Demurjian, T. C. Ting. 333-348
- Integrity and the Audit of Trusted Database Management SystemsJarrellann Filsinger. 349-366
- On the Axiomatization of Security Policy: Some Tentative Observations about Logic RepresentationJames Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li. 367-386
- Workshop SummaryTeresa F. Lunt. 387-396
- IFIP WG 11.3 Database Security: Research Questions of Current SignificanceCarl E. Landwehr. 397