Abstract is missing.
- Recent Advances in Access Control ModelsSushil Jajodia, Duminda Wijesekera. 3-15
- Role-based Access Control on the Web Using LDAPJoon S. Park, Gail-Joon Ahn, Ravi S. Sandhu. 19-30
- Constraints-based Access ControlWee-Yeh Tan. 31-44
- Secure Role-Based Workflow ModelsSavith Kandala, Ravi S. Sandhu. 45-58
- Subject Switching Algorithms for Access Control in Federated DatabasesJacqueline Yang, Duminda Wijesekera, Sushil Jajodia. 61-74
- Efficient Damage Assessment and Repair in Resilient Distributed Database SystemsPeng Liu, Xu Hao. 75-89
- Administering Permissions for Distributed Data: Factoring and Automated InferenceArnon Rosenthal, Edward Sciore. 91-104
- State-Dependent Security Decisions for Distributed Object-SystemsJoachim Biskup, Thomas Leineweber. 105-118
- Reorganization of Database Log for Information Warfare Data RecoveryRumman Sobhan, Brajendra Panda. 121-134
- Randomly roving agents for intrusion detectionIra S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon. 135-149
- Public Telephone Network VulnerabilitiesG. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi. 151-164
- Flexible Security Policies in SQLSteve Barker, Arnon Rosenthal. 167-180
- The Inference Problem and Updates in Relational DatabasesCsilla Farkas, Tyrone S. Toland, Caroline M. Eastman. 181-194
- Managing Classified Documents in a Relational DatabaseAdrian Spalka. 195-208
- A Comparison Between ConSA and Current Linux Security ImplementationsAlexandre Hardy, Martin S. Olivier. 211-224
- A Novel Approach to Certificate Revocation ManagementRavi Mukkamala, Sushil Jajodia. 225-238
- ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database ApplicationsPramote Luenam, Peng Liu. 239-252
- An Extended Transaction Model Approach for Multilevel Secure Transaction ProcessingVijayalakshmi Atluri, Ravi Mukkamala. 255-268
- Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security SystemMarta Oliva, Fèlix Saltor. 269-282
- Security Procedures for Classification Mining AlgorithmsTom Johnsten, Vijay V. Raghavan. 285-297
- Regulating Access to XML documentsAlban Gabillon, Emmanuel Bruno. 299-314
- Panel on XML and SecuritySylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati. 317-323
- Selected Summary of DiscussionsDavid L. Spooner, Martin S. Olivier. 325-335