Sfoglia per Autore
RETISS: A Real TIme Security System for Threat Detection Using Fuzzy Logic
1991 F. Carrettoni, S. Castano, G. Martella, P. Samarati
Designing Information Systems for Cooperating Agents
1991 V. De Antonellis, B. Pernici, P. Samarati
F-ORM METHOD: a F-ORM Methodology for Reusing Specifications
1991 V. De Antonellis, B. Pernici, P. Samarati
Sicurezza delle basi di dati
1992 S. Castano, G. Martella, P. Samarati
Complementing Access Controls for Comprehensive Security
1992 M.G. Fugini, G. Martella, P. Samarati
Modeling Users’ Behavior and Threats in Security Systems
1992 S. Castano, P. Samarati
An Object-Oriented Security Model for Office Environments
1992 S. Castano, P. Samarati
The Case for Independent Updates
1992 S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati
Verifying System Security Using Petri Nets
1993 S. Castano, P. Samarati, C. Villa
Access Controls in Object-Oriented Database Systems: Some Approaches and Issues
1993 E. Bertino, S. Jajodia, P. Samarati
Achieving Incremental Consistency among Autonomous Replicated Databases
1993 S. Ceri, M.A.W. Houtsma, A.M. Keller, P. Samarati
High Assurance Discretionary Access Control for Object Bases
1993 E. Bertino, P. Samarati, S. Jajodia
Authorizations in Relational Database Management Systems
1993 E. Bertino, P. Samarati, S. Jajodia
A New Authorization Model for Object-Oriented Databases
1994 E. Bertino, F. Origgi, P. Samarati
Propagation of Authorizations in Distributed Databases
1994 P. Samarati, P. Ammann, S. Jajodia
A New Approach to Security System Development
1994 S. Castano, G. Martella, P. Samarati
Enforcing Mandatory Access Control in Object Bases
1994 E. Bertino, S. Jajodia, P. Samarati
Research Issues in Discretionary Authorizations for Object Bases
1994 E. Bertino, P. Samarati
A Discretionary Access Control Model with Temporal Authorizations
1994 E. Bertino, C. Bettini, P. Samarati
A Temporal Authorization Model
1994 E. Bertino, C. Bettini, P. Samarati
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile