dblp.uni-trier.dewww.uni-trier.de

Sylvia L. Osborn

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
41EECandy Wai-Yue Shum, Sylvia L. Osborn, He Wang: A Methodology for Bridging between RBAC and an Arbitrary Application Program. Secure Data Management 2008: 199-208
2007
40EEHe Wang, Sylvia L. Osborn: Discretionary access control with the administrative role graph model. SACMAT 2007: 151-156
39EEXin Jin, Sylvia L. Osborn: Architecture for Data Collection in Database Intrusion Detection Systems. Secure Data Management 2007: 96-107
2006
38EESylvia L. Osborn: Role-based access control: past, present and future. PST 2006: 4
37EEHe Wang, Sylvia L. Osborn: Delegation in the role graph model. SACMAT 2006: 91-100
36EEYunyu Song, Sylvia L. Osborn: Conflict of Interest in the Administrative Role Graph Model. Secure Data Management 2006: 100-114
2005
35EECecilia Ionita, Sylvia L. Osborn: Specifying an Access Control Model for Ontologies for the Semantic Web. Secure Data Management 2005: 73-85
2004
34 Mei Ge, Sylvia L. Osborn: A Design for Parameterized Roles. DBSec 2004: 251-264
33EEJingzhu Wang, Sylvia L. Osborn: A role-based approach to access control for XML databases. SACMAT 2004: 70-77
32EEShengli Sheng, Sylvia L. Osborn: A Classifier-Based Approach to User-Role Assignment for Web Applications. Secure Data Management 2004: 163-171
2003
31 He Wang, Sylvia L. Osborn: An Administrative Model for Role Graphs. DBSec 2003: 302-315
30EESylvia L. Osborn, Yan Han, Jun Liu: A methodology for managing roles in legacy systems. SACMAT 2003: 33-40
2002
29 Cecilia Ionita, Sylvia L. Osborn: Privilege Administration for the Role Graph Model. DBSec 2002: 15-25
28EEElisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi: Making access control more usable. SACMAT 2002: 141
27EESylvia L. Osborn: Information flow analysis of an RBAC system. SACMAT 2002: 163-168
26EESylvia L. Osborn: Integrating role graphs: a tool for security integration. Data Knowl. Eng. 43(3): 317-333 (2002)
2001
25 Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati: Panel on XML and Security. DBSec 2001: 317-323
2000
24EESylvia L. Osborn, Yuxia Guo: Modeling users in role-based access control. ACM Workshop on Role-Based Access Control 2000: 31-37
23 Sylvia L. Osborn: Database Security Integration using Role-Based Access Control. DBSec 2000: 245-258
22 Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373
21EESylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000)
1999
20EEMatunda Nyanchama, Sylvia L. Osborn: The Role Graph Model and Conflict of Interest. ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999)
1997
19EESylvia L. Osborn: Mandatory access control and role-based access control revisited. ACM Workshop on Role-Based Access Control 1997: 31-40
1996
18 Sylvia L. Osborn, L. Reid, G. Wesson: On the Interaction Between Role-Based Access Control and Relational Databases. DBSec 1996: 275-287
17EESylvia L. Osborn, Li Yu: Unifying Data, Behaviours, and Messages in Object-Oriented Databases. Data Knowl. Eng. 18(1): 29-54 (1996)
1995
16EEMatunda Nyanchama, Sylvia L. Osborn: The role graph model. ACM Workshop on Role-Based Access Control 1995
15 Matunda Nyanchama, Sylvia L. Osborn: Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144
1994
14 Matunda Nyanchama, Sylvia L. Osborn: Access Rights Administration in Role-Based Security Systems. DBSec 1994: 37-56
1993
13EEF. Bukhari, Sylvia L. Osborn: Two Fully Distributed Concurrency Control Algorithms. IEEE Trans. Knowl. Data Eng. 5(5): 872-881 (1993)
12EEMatunda Nyanchama, Sylvia L. Osborn: Role-Based Security, Object Oriented Databases & Separation of Duty. SIGMOD Record 22(4): 45-51 (1993)
1992
11 Matunda Nyanchama, Sylvia L. Osborn: Database Security Issues in Distributed Object-Oriented Databases. IWDOM 1992: 92-97
1991
10 Li Yu, Sylvia L. Osborn: Context Inheritance and Content Inheritance in an Object-Oriented Data Model. ICCI 1991: 240-251
9EELi Yu, Sylvia L. Osborn: An Evaluation Framework for Algebraic Object-Oriented Query Models. ICDE 1991: 670-677
8 Sylvia L. Osborn: Design Issues for Object-Oriented Database Systems. On Object-Oriented Database System 1991: 315-319
1989
7EESylvia L. Osborn: The Role of Polymorphism in Schema Evolution in an Object-Oriented Database. IEEE Trans. Knowl. Data Eng. 1(3): 310-317 (1989)
1988
6 Sylvia L. Osborn: Identity, Equality and Query Optimization. OODBS 1988: 346-351
1986
5EESylvia L. Osborn: Object Modelling. OODBS 1986: 231
4EESylvia L. Osborn, T. E. Heaven: The Design of a Relational Database System with Abstract Data Types for Domains. ACM Trans. Database Syst. 11(3): 357-373 (1986)
1979
3EESylvia L. Osborn: Towards a Universal Relation Interface. VLDB 1979: 52-60
2 Sylvia L. Osborn: Testing for Existence of a Covering Boyce-Codd normal Form. Inf. Process. Lett. 8(1): 11-14 (1979)
1978
1 Claudio L. Lucchesi, Sylvia L. Osborn: Candidate Keys for Relations. J. Comput. Syst. Sci. 17(2): 270-279 (1978)

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [22]
2Elisa Bertino [28]
3Joachim Biskup [22]
4F. Bukhari [13]
5Mei Ge [34]
6Yuxia Guo [24]
7Yan Han [30]
8T. E. Heaven [4]
9Cecilia Ionita [29] [35]
10Trent Jaeger [28]
11Xin Jin [39]
12Jun Liu [30]
13Claudio L. Lucchesi (Cláudio Leonardo Lucchesi) [1]
14Jonathan D. Moffett [28]
15Qamar Munawer [21]
16Matunda Nyanchama [11] [12] [14] [15] [16] [20]
17Ravi Ravi [28]
18L. Reid [18]
19Reind P. van de Riet [22]
20Arnon Rosenthal (Arnie Rosenthal) [22]
21Pierangela Samarati [25]
22Ravi S. Sandhu [21]
23Raban Serban [22]
24Shengli Sheng [32]
25Candy Wai-Yue Shum [41]
26Yunyu Song [36]
27Bhavani M. Thuraisingham [25]
28He Wang [31] [37] [40] [41]
29Jingzhu Wang [33]
30G. Wesson [18]
31Gio Wiederhold [22]
32Li Yu [9] [10] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)