| 2009 |
43 | | Sabah Mohammed,
Lyle F. Chamarette,
Jinan Fiaidhi,
Sylvia L. Osborn:
A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0.
CSE (1) 2009: 40-47 |
42 | | Garfield Zhiping Wu,
Sylvia L. Osborn,
Xin Jin:
Database Intrusion Detection Using Role Profiling with Role Hierarchy.
Secure Data Management 2009: 33-48 |
| 2008 |
41 | | Candy Wai-Yue Shum,
Sylvia L. Osborn,
He Wang:
A Methodology for Bridging between RBAC and an Arbitrary Application Program.
Secure Data Management 2008: 199-208 |
| 2007 |
40 | | He Wang,
Sylvia L. Osborn:
Discretionary access control with the administrative role graph model.
SACMAT 2007: 151-156 |
39 | | Xin Jin,
Sylvia L. Osborn:
Architecture for Data Collection in Database Intrusion Detection Systems.
Secure Data Management 2007: 96-107 |
| 2006 |
38 | | Sylvia L. Osborn:
Role-based access control: past, present and future.
PST 2006: 4 |
37 | | He Wang,
Sylvia L. Osborn:
Delegation in the role graph model.
SACMAT 2006: 91-100 |
36 | | Yunyu Song,
Sylvia L. Osborn:
Conflict of Interest in the Administrative Role Graph Model.
Secure Data Management 2006: 100-114 |
| 2005 |
35 | | Cecilia Ionita,
Sylvia L. Osborn:
Specifying an Access Control Model for Ontologies for the Semantic Web.
Secure Data Management 2005: 73-85 |
| 2004 |
34 | | Mei Ge,
Sylvia L. Osborn:
A Design for Parameterized Roles.
DBSec 2004: 251-264 |
33 | | Jingzhu Wang,
Sylvia L. Osborn:
A role-based approach to access control for XML databases.
SACMAT 2004: 70-77 |
32 | | Shengli Sheng,
Sylvia L. Osborn:
A Classifier-Based Approach to User-Role Assignment for Web Applications.
Secure Data Management 2004: 163-171 |
| 2003 |
31 | | He Wang,
Sylvia L. Osborn:
An Administrative Model for Role Graphs.
DBSec 2003: 302-315 |
30 | | Sylvia L. Osborn,
Yan Han,
Jun Liu:
A methodology for managing roles in legacy systems.
SACMAT 2003: 33-40 |
| 2002 |
29 | | Cecilia Ionita,
Sylvia L. Osborn:
Privilege Administration for the Role Graph Model.
DBSec 2002: 15-25 |
28 | | Elisa Bertino,
Trent Jaeger,
Jonathan D. Moffett,
Sylvia L. Osborn,
Ravi Ravi:
Making access control more usable.
SACMAT 2002: 141 |
27 | | Sylvia L. Osborn:
Information flow analysis of an RBAC system.
SACMAT 2002: 163-168 |
26 | | Sylvia L. Osborn:
Integrating role graphs: a tool for security integration.
Data Knowl. Eng. 43(3): 317-333 (2002) |
| 2001 |
25 | | Sylvia L. Osborn,
Bhavani M. Thuraisingham,
Pierangela Samarati:
Panel on XML and Security.
DBSec 2001: 317-323 |
| 2000 |
24 | | Sylvia L. Osborn,
Yuxia Guo:
Modeling users in role-based access control.
ACM Workshop on Role-Based Access Control 2000: 31-37 |
23 | | Sylvia L. Osborn:
Database Security Integration using Role-Based Access Control.
DBSec 2000: 245-258 |
22 | | Reind P. van de Riet,
Raban Serban,
Sylvia L. Osborn,
Arnon Rosenthal,
Vijayalakshmi Atluri,
Joachim Biskup,
Gio Wiederhold:
Panel.
DBSec 2000: 373 |
21 | | Sylvia L. Osborn,
Ravi S. Sandhu,
Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies.
ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) |
| 1999 |
20 | | Matunda Nyanchama,
Sylvia L. Osborn:
The Role Graph Model and Conflict of Interest.
ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) |
| 1997 |
19 | | Sylvia L. Osborn:
Mandatory access control and role-based access control revisited.
ACM Workshop on Role-Based Access Control 1997: 31-40 |
| 1996 |
18 | | Sylvia L. Osborn,
L. Reid,
G. Wesson:
On the Interaction Between Role-Based Access Control and Relational Databases.
DBSec 1996: 275-287 |
17 | | Sylvia L. Osborn,
Li Yu:
Unifying Data, Behaviours, and Messages in Object-Oriented Databases.
Data Knowl. Eng. 18(1): 29-54 (1996) |
| 1995 |
16 | | Matunda Nyanchama,
Sylvia L. Osborn:
The role graph model.
ACM Workshop on Role-Based Access Control 1995 |
15 | | Matunda Nyanchama,
Sylvia L. Osborn:
Modeling Mandatory Access Control in Role-Based Security Systems.
DBSec 1995: 129-144 |
| 1994 |
14 | | Matunda Nyanchama,
Sylvia L. Osborn:
Access Rights Administration in Role-Based Security Systems.
DBSec 1994: 37-56 |
| 1993 |
13 | | F. Bukhari,
Sylvia L. Osborn:
Two Fully Distributed Concurrency Control Algorithms.
IEEE Trans. Knowl. Data Eng. 5(5): 872-881 (1993) |
12 | | Matunda Nyanchama,
Sylvia L. Osborn:
Role-Based Security, Object Oriented Databases & Separation of Duty.
SIGMOD Record 22(4): 45-51 (1993) |
| 1992 |
11 | | Matunda Nyanchama,
Sylvia L. Osborn:
Database Security Issues in Distributed Object-Oriented Databases.
IWDOM 1992: 92-97 |
| 1991 |
10 | | Li Yu,
Sylvia L. Osborn:
Context Inheritance and Content Inheritance in an Object-Oriented Data Model.
ICCI 1991: 240-251 |
9 | | Li Yu,
Sylvia L. Osborn:
An Evaluation Framework for Algebraic Object-Oriented Query Models.
ICDE 1991: 670-677 |
8 | | Sylvia L. Osborn:
Design Issues for Object-Oriented Database Systems.
On Object-Oriented Database System 1991: 315-319 |
| 1989 |
7 | | Sylvia L. Osborn:
The Role of Polymorphism in Schema Evolution in an Object-Oriented Database.
IEEE Trans. Knowl. Data Eng. 1(3): 310-317 (1989) |
| 1988 |
6 | | Sylvia L. Osborn:
Identity, Equality and Query Optimization.
OODBS 1988: 346-351 |
| 1986 |
5 | | Sylvia L. Osborn:
Object Modelling.
OODBS 1986: 231 |
4 | | Sylvia L. Osborn,
T. E. Heaven:
The Design of a Relational Database System with Abstract Data Types for Domains.
ACM Trans. Database Syst. 11(3): 357-373 (1986) |
| 1979 |
3 | | Sylvia L. Osborn:
Towards a Universal Relation Interface.
VLDB 1979: 52-60 |
2 | | Sylvia L. Osborn:
Testing for Existence of a Covering Boyce-Codd normal Form.
Inf. Process. Lett. 8(1): 11-14 (1979) |
| 1978 |
1 | | Claudio L. Lucchesi,
Sylvia L. Osborn:
Candidate Keys for Relations.
J. Comput. Syst. Sci. 17(2): 270-279 (1978) |