|  | 2001 | 
|---|
| 19 |            | Sushil Jajodia,
Vijayalakshmi Atluri,
Thomas F. Keefe,
Catherine D. McCollum,
Ravi Mukkamala:
Multilevel Security Transaction Processing.
Journal of Computer Security 9(3): 165-195 (2001) | 
|  | 2000 | 
|---|
| 18 |            | Peng Liu,
Sushil Jajodia,
Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems.
Journal of Computer Security 8(4):  (2000) | 
|  | 1999 | 
|---|
| 17 |            | Amgad Fayad,
Sushil Jajodia,
Catherine D. McCollum:
Application-Level Isolation Using Data Inconsistency Detection.
ACSAC 1999: 119- | 
| 16 |            | Peng Liu,
Sushil Jajodia,
Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems.
DBSec 1999: 3-18 | 
| 15 |            | Sushil Jajodia,
Catherine D. McCollum,
Paul Ammann:
Trusted Recovery.
Commun. ACM 42(7): 71-75 (1999) | 
| 14 |            | Sushil Jajodia,
Paul Ammann,
Catherine D. McCollum:
Surviving Information Warfare Attacks.
IEEE Computer 32(4): 57-63 (1999) | 
|  | 1998 | 
|---|
| 13 |            | Sushil Jajodia,
Peng Liu,
Catherine D. McCollum:
Application-Level Isolation to Cope with Malicious Database Users.
ACSAC 1998: 73-82 | 
|  | 1997 | 
|---|
| 12 |            | Catherine D. McCollum,
Donald B. Faatz,
William R. Herndon,
E. John Sebes,
Roshan K. Thomas:
Distributed Object Technologies, Databases and Security.
DBSec 1997: 17-31 | 
| 11 |            | Paul Ammann,
Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Surviving information warfare attacks on databases.
IEEE Symposium on Security and Privacy 1997: 164-174 | 
|  | 1996 | 
|---|
| 10 |            | Vijayalakshmi Atluri,
Sushil Jajodia,
Thomas F. Keefe,
Catherine D. McCollum,
Ravi Mukkamala:
Multilevel Secure Transaction Processing: Status and Prospects.
DBSec 1996: 79-98 | 
| 9 |            | Catherine D. McCollum,
Arnon Rosenthal,
Barbara T. Blaustein:
Flexible Security Policies for Digital Libraries.
ACM Comput. Surv. 28(4es): 110 (1996) | 
|  | 1995 | 
|---|
| 8 |            | Barbara T. Blaustein,
Catherine D. McCollum,
LouAnna Notargiacomo,
K. P. Smith,
Richard D. Graubart:
Autonomy and Confidentiality: Secure Federated Data Management.
NGITS 1995: 0- | 
| 7 |            | LouAnna Notargiacomo,
Barbara T. Blaustein,
Catherine D. McCollum:
Merging Models: Integrity, Dynamic Separation of Duty, and Trusted Data Management.
Journal of Computer Security 3(2/3): 207-230 (1995) | 
| 6 |            | Arnon Rosenthal,
Leonard J. Seligman,
Catherine D. McCollum,
Barbara T. Blaustein,
Bhavani M. Thuraisingham,
Edward Lafferty:
Data Management Research at The MITRE Corporation.
SIGMOD Record 24(3): 77-82 (1995) | 
|  | 1993 | 
|---|
| 5 |            | Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases.
DBSec 1993: 109-121 | 
| 4 |            | LouAnna Notargiacomo,
Barbara T. Blaustein,
Catherine D. McCollum:
A Model of Integrity Separation of Duty for a Trusted DBMS.
DBSec 1993: 237-256 | 
|  | 1992 | 
|---|
| 3 |            | Catherine D. McCollum:
Panel Discussion: Security for Distributed Database Management Systems.
DBSec 1992: 143-148 | 
|  | 1991 | 
|---|
| 2 |            | Catherine D. McCollum,
LouAnna Notargiacomo:
Distributed Concurrency Control with Optional Data Replication.
DBSec 1991: 149-172 | 
|  | 1990 | 
|---|
| 1 |            | Catherine D. McCollum,
J. R. Messing,
LouAnna Notargiacomo:
Beyond the Pale of MAC and DAC-Defining New Forms of Access Control.
IEEE Symposium on Security and Privacy 1990: 190-200 |