-
1
-
-
84949747356
-
An Authorization Model for Workflows
-
(Sept.) Springer-Verlag, New York
-
Atluri, V. and Huang, W.-K. 1996. An Authorization Model for Workflows. In Proceedings of the Fifth European Symposium on Research in Computer Security (Sept.), in Lecture Notes in Computer Science, vol. 1146, Springer-Verlag, New York, 44-64.
-
(1996)
Proceedings of the Fifth European Symposium on Research in Computer Security
, vol.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
2
-
-
0031355379
-
Enforcing mandatory and discretionary security in workflow management systems
-
Atluri, V. and Huang, W.-K. 1997. Enforcing mandatory and discretionary security in workflow management systems. J. Comput. Sec. 5, 4, 303-339.
-
(1997)
J. Comput. Sec.
, vol.5
, pp. 303-339
-
-
Atluri, V.1
Huang, W.-K.2
-
3
-
-
78449251691
-
A Temporal Authorization Model
-
(Fairfax, Va., Nov.)
-
Bertino, E., Bettini, C., and Samarati, P. 1994. A Temporal Authorization Model. In Proceedings of the second ACM conference on computer and communications security (Fairfax, Va., Nov.), 126-135.
-
(1994)
Proceedings of the second ACM conference on computer and communications security
, pp. 126-135
-
-
Bertino, E.1
Bettini, C.2
Samarati, P.3
-
4
-
-
0031382313
-
A Flexible Model Supporting the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems
-
(Nov.)
-
Bertino, E., Ferrari, E., and Atluri, V. 1997. A Flexible Model Supporting the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems. In Proceedings of the Second ACM Workshop on Role-Based Access Control (Nov.), 1-12.
-
(1997)
Proceedings of the Second ACM Workshop on Role-Based Access Control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
0027741527
-
Authorizations in Relational Database Management Systems
-
(Fairfax, Va., Nov.)
-
Bertino, E., Samarati, P., and Jajodia, S. 1993a. Authorizations in Relational Database Management Systems. In Proceedings of the First ACM Conference on Computer and Communications Security (Fairfax, Va., Nov.), 130-139.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 130-139
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
6
-
-
0027710821
-
High Assurance Discretionary Access Control for Object Bases
-
(Fairfax, Va., Nov.)
-
Bertino, E., Samarati, P., and Jajodia, S. 1993b. High Assurance Discretionary Access Control for Object Bases. In Proceedings of the First ACM Conference on Computer and Communications Security (Fairfax, Va., Nov.), 140-150.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 140-150
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
7
-
-
0030087035
-
A Temporal Access Control Mechanism for Database Systems
-
Bertino, E., Bettini, C., Ferrari, E., and Samarati, P. 1996. A Temporal Access Control Mechanism for Database Systems. IEEE Trans. Knowl. Data Eng. 8, 1, 67-80.
-
(1996)
IEEE Trans. Knowl. Data Eng.
, vol.8
, Issue.1
, pp. 67-80
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
0032153903
-
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning
-
Bertino, E., Bettini, C., Ferrari, E., and Samarati, P. 1998. An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Sys. 23, 3, 231-285.
-
(1998)
ACM Trans. Database Sys.
, vol.23
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
9
-
-
4243117666
-
Autonomy and Confidentiality: Secure Federated Data Management
-
(Nahariya, Israel, June)
-
Blaustein, B., Mccollum, C., Notargiacomo, L., Smith, K., and Graubart, R. 1995. Autonomy and Confidentiality: Secure Federated Data Management. In Proceedings of the Second International Workshop on Next Generation Information Technologies and Systems (NGITS'95) (Nahariya, Israel, June), 59-68.
-
(1995)
Proceedings of the Second International Workshop on Next Generation Information Technologies and Systems (NGITS'95)
, pp. 59-68
-
-
Blaustein, B.1
Mccollum, C.2
Notargiacomo, L.3
Smith, K.4
Graubart, R.5
-
10
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
(Oakland, Calif., April)
-
Clark, D. D. and Wilson, D. R. 1987. A Comparison of Commercial and Military Computer Security Policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., April), 184-194.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
11
-
-
0022327942
-
On an Algebra for Historical Relational Databases: Two Views
-
(May)
-
Clifford, J. and Tansel, A. U. 1985. On an Algebra for Historical Relational Databases: Two Views. In Proceedings of ACM SIGMOD (May), 247-265.
-
(1985)
Proceedings of ACM SIGMOD
, pp. 247-265
-
-
Clifford, J.1
Tansel, A.U.2
-
12
-
-
0031357551
-
Authorization Specification and Enforcement in Federated Database Systems
-
di Vimercati, S. D. C. and Samarati, P. 1997. Authorization Specification and Enforcement in Federated Database Systems. J. Comput. Sec. 5, 2, 155-188.
-
(1997)
J. Comput. Sec. 5
, vol.5
, Issue.2
, pp. 155-188
-
-
di Vimercati, S.D.C.1
Samarati, P.2
-
13
-
-
0042009016
-
Pardes-A Data-Driven Oriented Active Database Model
-
(March)
-
Etzion, O. 1993. Pardes-A Data-Driven Oriented Active Database Model. ACM SIGMOD Rec. 22, 1 (March), 7-14.
-
(1993)
ACM SIGMOD Rec.
, vol.22
, Issue.1
, pp. 7-14
-
-
Etzion, O.1
-
14
-
-
0024663901
-
A Security Model for Object-Oriented Databases
-
(May)
-
Fernandez, E. B., Gudes, E., and Song, H. 1989. A Security Model for Object-Oriented Databases. In Proceedings of the IEEE Symposium on Security and Privacy (May), 110-115.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 110-115
-
-
Fernandez, E.B.1
Gudes, E.2
Song, H.3
-
15
-
-
0002770949
-
Semantic Interoperability in Information Services: Experiencing with Coopware
-
Gal, A. 1999. Semantic Interoperability in Information Services: Experiencing with Coopware. ACM SIGMOD Rec. 28, 1, 68-75.
-
(1999)
ACM SIGMOD Rec.
, vol.28
, Issue.1
, pp. 68-75
-
-
Gal, A.1
-
16
-
-
0034450094
-
An Authorization Model for Temporal Data
-
(Athens, Greece, Nov.)
-
Gal, A. and Atluri, V. 2000. An Authorization Model for Temporal Data. In Proceedings of the Seventh ACM Conference on Computer and Communication Security (Athens, Greece, Nov.), 144-153.
-
(2000)
Proceedings of the Seventh ACM Conference on Computer and Communication Security
, pp. 144-153
-
-
Gal, A.1
Atluri, V.2
-
17
-
-
84947933762
-
Tale-A Temporal Active Language and Execution Model
-
P. Constantopoulos, J. Mylopoulos, and Y. Vassiliou, Eds., Springer-Verlag, New York
-
Gal, A., Etzion, O., and Segev, A. 1996. Tale-A Temporal Active Language and Execution Model. In Advanced Information Systems Engineering, P. Constantopoulos, J. Mylopoulos, and Y. Vassiliou, Eds., Springer-Verlag, New York, 60-81.
-
(1996)
Advanced Information Systems Engineering
, pp. 60-81
-
-
Gal, A.1
Etzion, O.2
Segev, A.3
-
18
-
-
84976706627
-
A Glossary of Temporal Database Concepts
-
Jensen, C., Clifford, J., Gadia, S., Segev, A., and Snodgrass, R. 1992. A Glossary of Temporal Database Concepts. ACMSIGMOD Rec. 21, 3, 35-43.
-
(1992)
ACMSIGMOD Rec.
, vol.21
, Issue.3
, pp. 35-43
-
-
Jensen, C.1
Clifford, J.2
Gadia, S.3
Segev, A.4
Snodgrass, R.5
-
19
-
-
0007932097
-
An Approach for Building Secure Database Federations
-
(Santiago de Chile, Chile), J. Bocca, M. Jarke, and C. Zaniolo, Eds., Morgan Kaufmann, San Mateo, Calif
-
Jonscher, D. and Dittrich, K. 1994. An Approach for Building Secure Database Federations. In Proceedings of the Twentieth International Conference on Very Large Data Bases (VLDB'94) (Santiago de Chile, Chile), J. Bocca, M. Jarke, and C. Zaniolo, Eds., Morgan Kaufmann, San Mateo, Calif., 24-35.
-
(1994)
Proceedings of the Twentieth International Conference on Very Large Data Bases (VLDB'94)
, pp. 24-35
-
-
Jonscher, D.1
Dittrich, K.2
-
20
-
-
0007457393
-
Towards an Infrastructure for Temporal Databases-A Workshop Report
-
Pissinou, N., Snodgrass, R., Elmasri, R., Mumick, I., Ozsu, M., Pernici, B., Segev, A., and Theodoulidis, B. 1994. Towards an Infrastructure for Temporal Databases-A Workshop Report. ACM SIGMOD Rec. 23, 1, 35.
-
(1994)
ACM SIGMOD Rec.
, vol.23
, pp. 35
-
-
Pissinou, N.1
Snodgrass, R.2
Elmasri, R.3
Mumick, I.4
Ozsu, M.5
Pernici, B.6
Segev, A.7
Theodoulidis, B.8
-
21
-
-
0026119329
-
A Model of Authorization for Next-Generation Database Systems
-
(March)
-
Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16, 1 (March), 88-131.
-
(1991)
ACM Trans. Database Syst.
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
23
-
-
0038561120
-
First Class Views: A Key to User-Centered Computing
-
Rosenthal, A. and Sciore, E. 1999. First Class Views: A Key to User-Centered Computing. SIGMOD Rec. 28, 3, 22-28.
-
(1999)
SIGMOD Rec.
, vol.28
, Issue.3
, pp. 22-28
-
-
Rosenthal, A.1
Sciore, E.2
-
24
-
-
84870803217
-
Security Administration for Federations, Warehouses, and Other Derived Data
-
Rosenthal, A., Sciore, E., and Doshi, V. 1999. Security Administration for Federations, Warehouses, and Other Derived Data. In Research Advances in Database and Information Systems Security, 209-223.
-
(1999)
Research Advances in Database and Information Systems Security
, pp. 209-223
-
-
Rosenthal, A.1
Sciore, E.2
Doshi, V.3
-
25
-
-
14644425554
-
Propagation of Authorizations in Distributed Database Systems
-
(Fairfax, Va., Nov.)
-
Samarati, P., Ammann, P., and Jajodia, S. 1994. Propagation of Authorizations in Distributed Database Systems. In Proceedings of the Second ACM Conference on Computer and Communications Security (Fairfax, Va., Nov.), 136-147.
-
(1994)
Proceedings of the Second ACM Conference on Computer and Communications Security
, pp. 136-147
-
-
Samarati, P.1
Ammann, P.2
Jajodia, S.3
-
26
-
-
0030216932
-
An Authorization Model for a Distributed Hypertext System
-
Samarati, P., Bertino, E., and Jajodia, S. 1996. An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8, 4, 555-562.
-
(1996)
IEEE Trans. Knowl. Data Eng.
, vol.8
, pp. 555-562
-
-
Samarati, P.1
Bertino, E.2
Jajodia, S.3
-
28
-
-
0003342146
-
Separation of Duties in Computerized Information Systems
-
S. Jajodia and C. Landwehr, Eds., North Holland, Amsterdam, The Netherlands
-
Sandhu, R. S. 1991. Separation of Duties in Computerized Information Systems. In Database Security, IV: Status and Prospects, S. Jajodia and C. Landwehr, Eds., North Holland, Amsterdam, The Netherlands, 179-189.
-
(1991)
Database Security, IV: Status and Prospects
, pp. 179-189
-
-
Sandhu, R.S.1
-
29
-
-
0030086382
-
Role-Based Access Control Models
-
(Feb.)
-
Sandhu, R. S. et al. 1996. Role-Based Access Control Models. IEEE Computer 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
-
31
-
-
1842458587
-
The Impact of Inheritance on Security in Object-Oriented Database Systems
-
Carl E. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands
-
Spooner, D. L. 1989. The Impact of Inheritance on Security in Object-Oriented Database Systems. In Database Security, II: Status and Prospects, Carl E. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands, 141-160.
-
(1989)
Database Security, II: Status and Prospects
, pp. 141-160
-
-
Spooner, D.L.1
-
32
-
-
0002813889
-
Pragmatics of Access Control in Mermaid
-
(Sept.) Special Issue on Federated Database Systems
-
Templeton, M., Lund, E., and Ward, P. 1987. Pragmatics of Access Control in Mermaid. Data Eng. 10, 3 (Sept.), 33-38. Special Issue on Federated Database Systems.
-
(1987)
Data Eng.
, vol.10
, pp. 33-38
-
-
Templeton, M.1
Lund, E.2
Ward, P.3
-
33
-
-
0346299851
-
Discretionary Access Control In Object-Oriented Databases
-
(Baltimore, Md., Sept.)
-
Thomas, R. K. and Sandhu, R. S. 1993. Discretionary Access Control in Object-Oriented Databases. In Proceedings of the Sixteenth National Computer Security Conference (Baltimore, Md., Sept.), 63-74.
-
(1993)
Proceedings of the Sixteenth National Computer Security Conference
, pp. 63-74
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
34
-
-
0023246976
-
Access Control in a Heterogeneous Distributed Database Management System
-
(Williamsburg, Va., March)
-
Wang, C. and Spooner, D. 1987. Access Control in a Heterogeneous Distributed Database Management System. In Proceedings of the IEEE Sixth Symposium on Reliability in Distributed Software and Database Systems (Williamsburg, Va., March), 84-92.
-
(1987)
Proceedings of the IEEE Sixth Symposium on Reliability in Distributed Software and Database Systems
, pp. 84-92
-
-
Wang, C.1
Spooner, D.2
-
35
-
-
0026851844
-
Authorization in Distributed Systems: A Formal Approach
-
(Oakland, Calif., May)
-
Woo, T. Y. and Lam, S. S. 1992. Authorization in Distributed Systems: A Formal Approach. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May), 33-50.
-
(1992)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 33-50
-
-
Woo, T.Y.1
Lam, S.S.2
-
36
-
-
0027713594
-
A Framework for Distributed Authorization
-
(Fairfax, Va., Nov.)
-
Woo, T. Y. and Lam, S. S. 1993. A Framework for Distributed Authorization. In Proceedings of the First ACM Conference on Computer and Communications Security (Fairfax, Va., Nov.), 112-118.
-
(1993)
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 112-118
-
-
Woo, T.Y.1
Lam, S.S.2
|