1995 | ||
---|---|---|
7 | Barbara T. Blaustein, Catherine D. McCollum, LouAnna Notargiacomo, K. P. Smith, Richard D. Graubart: Autonomy and Confidentiality: Secure Federated Data Management. NGITS 1995: 0- | |
1994 | ||
6 | EE | Jeffrey Picciotto, Richard D. Graubart: Extended labeling policies for enhanced application support. Computers & Security 13(7): 587-599 (1994) |
1990 | ||
5 | LouAnna Notargiacomo, Richard D. Graubart: Health Delivery: The Problem solved? DBSec 1990: 13-26 | |
1989 | ||
4 | Richard D. Graubart: Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. DBSec 1989: 109-114 | |
3 | Richard D. Graubart: A Comparison of Three Secure DBMS Architectures. DBSec 1989: 167-190 | |
1984 | ||
2 | Richard D. Graubart: The Integrity-Lock Approach to Secure Database Management. IEEE Symposium on Security and Privacy 1984: 62-74 | |
1982 | ||
1 | Richard D. Graubart, John P. L. Woodward: A Preliminary Naval Surveillance DBMS Security Model. IEEE Symposium on Security and Privacy 1982: 21-37 |
1 | Barbara T. Blaustein | [7] |
2 | Catherine D. McCollum | [7] |
3 | LouAnna Notargiacomo | [5] [7] |
4 | Jeffrey Picciotto | [6] |
5 | K. P. Smith | [7] |
6 | John P. L. Woodward | [1] |