| 2001 |
19 | | Sushil Jajodia,
Vijayalakshmi Atluri,
Thomas F. Keefe,
Catherine D. McCollum,
Ravi Mukkamala:
Multilevel Security Transaction Processing.
Journal of Computer Security 9(3): 165-195 (2001) |
| 2000 |
18 | | Peng Liu,
Sushil Jajodia,
Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems.
Journal of Computer Security 8(4): (2000) |
| 1999 |
17 | | Amgad Fayad,
Sushil Jajodia,
Catherine D. McCollum:
Application-Level Isolation Using Data Inconsistency Detection.
ACSAC 1999: 119- |
16 | | Peng Liu,
Sushil Jajodia,
Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems.
DBSec 1999: 3-18 |
15 | | Sushil Jajodia,
Catherine D. McCollum,
Paul Ammann:
Trusted Recovery.
Commun. ACM 42(7): 71-75 (1999) |
14 | | Sushil Jajodia,
Paul Ammann,
Catherine D. McCollum:
Surviving Information Warfare Attacks.
IEEE Computer 32(4): 57-63 (1999) |
| 1998 |
13 | | Sushil Jajodia,
Peng Liu,
Catherine D. McCollum:
Application-Level Isolation to Cope with Malicious Database Users.
ACSAC 1998: 73-82 |
| 1997 |
12 | | Catherine D. McCollum,
Donald B. Faatz,
William R. Herndon,
E. John Sebes,
Roshan K. Thomas:
Distributed Object Technologies, Databases and Security.
DBSec 1997: 17-31 |
11 | | Paul Ammann,
Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Surviving information warfare attacks on databases.
IEEE Symposium on Security and Privacy 1997: 164-174 |
| 1996 |
10 | | Vijayalakshmi Atluri,
Sushil Jajodia,
Thomas F. Keefe,
Catherine D. McCollum,
Ravi Mukkamala:
Multilevel Secure Transaction Processing: Status and Prospects.
DBSec 1996: 79-98 |
9 | | Catherine D. McCollum,
Arnon Rosenthal,
Barbara T. Blaustein:
Flexible Security Policies for Digital Libraries.
ACM Comput. Surv. 28(4es): 110 (1996) |
| 1995 |
8 | | Barbara T. Blaustein,
Catherine D. McCollum,
LouAnna Notargiacomo,
K. P. Smith,
Richard D. Graubart:
Autonomy and Confidentiality: Secure Federated Data Management.
NGITS 1995: 0- |
7 | | LouAnna Notargiacomo,
Barbara T. Blaustein,
Catherine D. McCollum:
Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management.
Journal of Computer Security 3(2/3): 207-230 (1995) |
6 | | Arnon Rosenthal,
Leonard J. Seligman,
Catherine D. McCollum,
Barbara T. Blaustein,
Bhavani M. Thuraisingham,
Edward Lafferty:
Data Management Research at The MITRE Corporation.
SIGMOD Record 24(3): 77-82 (1995) |
| 1993 |
5 | | Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases.
DBSec 1993: 109-121 |
4 | | LouAnna Notargiacomo,
Barbara T. Blaustein,
Catherine D. McCollum:
A Model of Integrity Separation of Duty for a Trusted DBMS.
DBSec 1993: 237-256 |
| 1992 |
3 | | Catherine D. McCollum:
Panel Discussion: Security for Distributed Database Management Systems.
DBSec 1992: 143-148 |
| 1991 |
2 | | Catherine D. McCollum,
LouAnna Notargiacomo:
Distributed Concurrency Control with Optional Data Replication.
DBSec 1991: 149-172 |
| 1990 |
1 | | Catherine D. McCollum,
J. R. Messing,
LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
IEEE Symposium on Security and Privacy 1990: 190-200 |