Adrian Spalka

According to our database1, Adrian Spalka authored at least 26 papers between 1994 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice.
Proceedings of the ICISSP 2015, 2015

2011
Decentralized Generation of Multiple, Uncorrelatable Pseudonyms without Trusted Third Parties.
Proceedings of the Trust, Privacy and Security in Digital Business, 2011

2005
An Approach to Securely Interconnect Geo Web Services.
Proceedings of the Web Information Systems Engineering, 2005

Multilateral security considerations for adaptive mobile applications.
Proceedings of the ICETE 2005, 2005

A Comprehensive Approach to Anomaly Detection in Relational Databases.
Proceedings of the Data and Applications Security XIX, 2005

2003
A Protection Environment for Administrators of Windows 2000/XP Against Malicious Program Attacks.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
Trojan horse attacks on software for electronic signatures.
Informatica (Slovenia), 2002

Protecting Java Component Integrity Against Trojan Horse Programs.
Proceedings of the Integrity and Internal Control in Information Systems V, 2002

Notes on Application-Orientated Access Control.
Proceedings of the 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2002

Protecting the User from the Data: Security and Privacy Aspects of Public Web Access.
Proceedings of the Adaptive Hypermedia and Adaptive Web-Based Systems, 2002

2001
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Managing Classified Documents in a Relational Database.
Proceedings of the Database and Application Security XV, 2001

2000
Structured Name-Spaces in Secure Databases.
J. Comput. Secur., 2000

Confidentiality vs. Integrity in Secure Databases.
Proceedings of the Data and Application Security, 2000

Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
The Effect of Confidentiality on the Structure of Databases.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

1997
Netzwerk-Strukturierung -- Strukturierung eines multimedialen Netzwerks für Schulen.
LOG IN, 1997

1996
A study of the extensibility of logic-based databases with confidentiality-capabilities.
PhD thesis, 1996

Sicherheitsaspekte.
LOG IN, 1996

An Axiomatic Interpretation of Confidentiality Demands in Logic-Based Relational Databases.
Proceedings of the Logic in Databases, 1996

Security Threats and Security Policies for Networked Multimedia Information Systems in Medicine.
Proceedings of the Medizinische Informatik, Biometrie und Epidemiologie, 1996

The non-primitiveness of the simple-security property and its non-applicability to relational databases.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
Einige grundlegende Betrachtungen über Geheimhaltung in Datenbanken.
Proceedings of the Verläßliche IT-Systeme, Proceedings der GI-Fachtagung VIS '95, 1995

1994
Formal semantics of confidentiality in multilevel logic databases.
Proceedings of the 1994 Workshop on New Security Paradigms, 1994

Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets.
Proceedings of the Database Security, 1994

Formal Semantics of Rights and Confidentiality in Definite Deductive Databases
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994


  Loading...