-
1
-
-
85031561614
-
-
AlphaWorks, XML Security Suite, April
-
AlphaWorks, XML Security Suite, April 1999, http://www.alphaWorks.ibm.com/tech/xmlsecuritysuite.
-
(1999)
-
-
-
3
-
-
0004101993
-
-
Wiley, New York
-
F. Buschmann, R. Meunier, H. Rohnert, P. Sommerlad and M. Stal, Pattern-Oriented Software Architecture - A System of Patterns, Wiley, New York, 1996.
-
(1996)
Pattern-Oriented Software Architecture - A System of Patterns
-
-
Buschmann, F.1
Meunier, R.2
Rohnert, H.3
Sommerlad, P.4
Stal, M.5
-
4
-
-
0004190705
-
-
Addison-Wesley, Reading, MA
-
S. Castano, M.G. Fugini, G. Martella and P. Samarati, Database Security, Addison-Wesley, Reading, MA, 1995.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.G.2
Martella, G.3
Samarati, P.4
-
5
-
-
3042669856
-
XML-GL: A graphical language for querying and restructuring XML documents
-
Toronto, May
-
S. Ceri, S. Comai, E. Damiani, P. Fraternali, S. Paraboschi and L. Tanca, XML-GL: A graphical language for querying and restructuring XML documents, in: Proc. 8th International Conference on the World Wide Web, Toronto, May 1999.
-
(1999)
In: Proc. 8th International Conference on the World Wide Web
-
-
Ceri, S.1
Comai, S.2
Damiani, E.3
Fraternali, P.4
Paraboschi, S.5
Tanca, L.6
-
6
-
-
0037889209
-
Securing XML documents
-
Konstanz, March (in press).
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, Securing XML documents, in: Proc. 2000 International Conference on Extending Database Technology (EDBT2000), Konstanz, March 2000 (in press).
-
(2000)
In: Proc. 2000 International Conference on Extending Database Technology (EDBT2000)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
8
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
Tucson, AZ, May
-
S. Jajodia, P. Samarati, V.S. Subramanian and E. Bertino, A unified framework for enforcing multiple access control policies, in: Proc. 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ, May 1997.
-
(1997)
In: Proc. 1997 ACM International SIGMOD Conference on Management of Data
-
-
Jajodia, S.1
Samarati, P.2
Subramanian, V.S.3
Bertino, E.4
-
10
-
-
33747607086
-
The DCE project: Providing authorizations and other distributed services to the World Wide Web
-
October
-
S. Lewontin and M.E. Zurko, The DCE project: providing authorizations and other distributed services to the World Wide Web, in: Proc. 2nd World Wide Web Conference, October 1994, http://www.ncsa.uiuc.edu/SDG/IT94/Proceedings/Security/lewontin/Web_DCE_Conf_94. html.
-
(1994)
In: Proc. 2nd World Wide Web Conference
-
-
Lewontin, S.1
Zurko, M.E.2
-
11
-
-
0003054727
-
Access control policies for database systems
-
in: C.E. Landwehr (Ed.), North-Holland, Amsterdam
-
T.F. Lunt, Access control policies for database systems, in: C.E. Landwehr (Ed.), Database Security, II: Status and Prospects, North-Holland, Amsterdam, 1989, pp. 41-52.
-
(1989)
Database Security, II: Status and Prospects
, pp. 41-52
-
-
Lunt, T.F.1
-
15
-
-
0030086382
-
Role-based access control models
-
Youman
-
Youman, Role-based access control models, IEEE Computer 29 (2) (1996) 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
-
20
-
-
0003587596
-
-
World Wide Web Consortium (W3C), November
-
World Wide Web Consortium (W3C), XML Path Language (XPath), November 1999, http://www.w3.org/TR/xpath.
-
(1999)
XML Path Language (XPath)
-
-
-
21
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Oakland, May
-
M.E. Zurko, R. Simon and T. Sanfilippo, A user-centered, modular authorization service built on an RBAC foundation, in: Proc. 20th IEEE Symposium on Security and Privacy, Oakland, May 1999, pp. 57-71.
-
(1999)
In: Proc. 20th IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.E.1
Simon, R.2
Sanfilippo, T.3
|