2008 |
41 | EE | Candy Wai-Yue Shum,
Sylvia L. Osborn,
He Wang:
A Methodology for Bridging between RBAC and an Arbitrary Application Program.
Secure Data Management 2008: 199-208 |
2007 |
40 | EE | He Wang,
Sylvia L. Osborn:
Discretionary access control with the administrative role graph model.
SACMAT 2007: 151-156 |
39 | EE | Xin Jin,
Sylvia L. Osborn:
Architecture for Data Collection in Database Intrusion Detection Systems.
Secure Data Management 2007: 96-107 |
2006 |
38 | EE | Sylvia L. Osborn:
Role-based access control: past, present and future.
PST 2006: 4 |
37 | EE | He Wang,
Sylvia L. Osborn:
Delegation in the role graph model.
SACMAT 2006: 91-100 |
36 | EE | Yunyu Song,
Sylvia L. Osborn:
Conflict of Interest in the Administrative Role Graph Model.
Secure Data Management 2006: 100-114 |
2005 |
35 | EE | Cecilia Ionita,
Sylvia L. Osborn:
Specifying an Access Control Model for Ontologies for the Semantic Web.
Secure Data Management 2005: 73-85 |
2004 |
34 | | Mei Ge,
Sylvia L. Osborn:
A Design for Parameterized Roles.
DBSec 2004: 251-264 |
33 | EE | Jingzhu Wang,
Sylvia L. Osborn:
A role-based approach to access control for XML databases.
SACMAT 2004: 70-77 |
32 | EE | Shengli Sheng,
Sylvia L. Osborn:
A Classifier-Based Approach to User-Role Assignment for Web Applications.
Secure Data Management 2004: 163-171 |
2003 |
31 | | He Wang,
Sylvia L. Osborn:
An Administrative Model for Role Graphs.
DBSec 2003: 302-315 |
30 | EE | Sylvia L. Osborn,
Yan Han,
Jun Liu:
A methodology for managing roles in legacy systems.
SACMAT 2003: 33-40 |
2002 |
29 | | Cecilia Ionita,
Sylvia L. Osborn:
Privilege Administration for the Role Graph Model.
DBSec 2002: 15-25 |
28 | EE | Elisa Bertino,
Trent Jaeger,
Jonathan D. Moffett,
Sylvia L. Osborn,
Ravi Ravi:
Making access control more usable.
SACMAT 2002: 141 |
27 | EE | Sylvia L. Osborn:
Information flow analysis of an RBAC system.
SACMAT 2002: 163-168 |
26 | EE | Sylvia L. Osborn:
Integrating role graphs: a tool for security integration.
Data Knowl. Eng. 43(3): 317-333 (2002) |
2001 |
25 | | Sylvia L. Osborn,
Bhavani M. Thuraisingham,
Pierangela Samarati:
Panel on XML and Security.
DBSec 2001: 317-323 |
2000 |
24 | EE | Sylvia L. Osborn,
Yuxia Guo:
Modeling users in role-based access control.
ACM Workshop on Role-Based Access Control 2000: 31-37 |
23 | | Sylvia L. Osborn:
Database Security Integration using Role-Based Access Control.
DBSec 2000: 245-258 |
22 | | Reind P. van de Riet,
Raban Serban,
Sylvia L. Osborn,
Arnon Rosenthal,
Vijayalakshmi Atluri,
Joachim Biskup,
Gio Wiederhold:
Panel.
DBSec 2000: 373 |
21 | EE | Sylvia L. Osborn,
Ravi S. Sandhu,
Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies.
ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) |
1999 |
20 | EE | Matunda Nyanchama,
Sylvia L. Osborn:
The Role Graph Model and Conflict of Interest.
ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) |
1997 |
19 | EE | Sylvia L. Osborn:
Mandatory access control and role-based access control revisited.
ACM Workshop on Role-Based Access Control 1997: 31-40 |
1996 |
18 | | Sylvia L. Osborn,
L. Reid,
G. Wesson:
On the Interaction Between Role-Based Access Control and Relational Databases.
DBSec 1996: 275-287 |
17 | EE | Sylvia L. Osborn,
Li Yu:
Unifying Data, Behaviours, and Messages in Object-Oriented Databases.
Data Knowl. Eng. 18(1): 29-54 (1996) |
1995 |
16 | EE | Matunda Nyanchama,
Sylvia L. Osborn:
The role graph model.
ACM Workshop on Role-Based Access Control 1995 |
15 | | Matunda Nyanchama,
Sylvia L. Osborn:
Modeling Mandatory Access Control in Role-Based Security Systems.
DBSec 1995: 129-144 |
1994 |
14 | | Matunda Nyanchama,
Sylvia L. Osborn:
Access Rights Administration in Role-Based Security Systems.
DBSec 1994: 37-56 |
1993 |
13 | EE | F. Bukhari,
Sylvia L. Osborn:
Two Fully Distributed Concurrency Control Algorithms.
IEEE Trans. Knowl. Data Eng. 5(5): 872-881 (1993) |
12 | EE | Matunda Nyanchama,
Sylvia L. Osborn:
Role-Based Security, Object Oriented Databases & Separation of Duty.
SIGMOD Record 22(4): 45-51 (1993) |
1992 |
11 | | Matunda Nyanchama,
Sylvia L. Osborn:
Database Security Issues in Distributed Object-Oriented Databases.
IWDOM 1992: 92-97 |
1991 |
10 | | Li Yu,
Sylvia L. Osborn:
Context Inheritance and Content Inheritance in an Object-Oriented Data Model.
ICCI 1991: 240-251 |
9 | EE | Li Yu,
Sylvia L. Osborn:
An Evaluation Framework for Algebraic Object-Oriented Query Models.
ICDE 1991: 670-677 |
8 | | Sylvia L. Osborn:
Design Issues for Object-Oriented Database Systems.
On Object-Oriented Database System 1991: 315-319 |
1989 |
7 | EE | Sylvia L. Osborn:
The Role of Polymorphism in Schema Evolution in an Object-Oriented Database.
IEEE Trans. Knowl. Data Eng. 1(3): 310-317 (1989) |
1988 |
6 | | Sylvia L. Osborn:
Identity, Equality and Query Optimization.
OODBS 1988: 346-351 |
1986 |
5 | EE | Sylvia L. Osborn:
Object Modelling.
OODBS 1986: 231 |
4 | EE | Sylvia L. Osborn,
T. E. Heaven:
The Design of a Relational Database System with Abstract Data Types for Domains.
ACM Trans. Database Syst. 11(3): 357-373 (1986) |
1979 |
3 | EE | Sylvia L. Osborn:
Towards a Universal Relation Interface.
VLDB 1979: 52-60 |
2 | | Sylvia L. Osborn:
Testing for Existence of a Covering Boyce-Codd normal Form.
Inf. Process. Lett. 8(1): 11-14 (1979) |
1978 |
1 | | Claudio L. Lucchesi,
Sylvia L. Osborn:
Candidate Keys for Relations.
J. Comput. Syst. Sci. 17(2): 270-279 (1978) |