메뉴 건너뛰기




Volumn 11, Issue 1, 2002, Pages 58-67

An authorization system for digital libraries

Author keywords

Access control; Credentials; Digital libraries

Indexed keywords

ALGORITHMS; DATA STORAGE EQUIPMENT; DATABASE SYSTEMS; MULTIMEDIA SYSTEMS; SECURITY OF DATA;

EID: 0036706546     PISSN: 10668888     EISSN: None     Source Type: Journal    
DOI: 10.1007/s007780200063     Document Type: Article
Times cited : (9)

References (14)
  • 1
    • 0036510173 scopus 로고    scopus 로고
    • A content-based authorization model for digital libraries
    • TR 98104, CIMIC and MSIS Department, (March)
    • Adam N, Atluri V, Bertino E, Ferrari E (1998) A content-based authorization model for digital libraries. TR 98104, CIMIC and MSIS Department, Rutgers University; (http://cimic.rutgers.edu/atluri/tr98-104.ps). IEEE Trans Knowl Data Eng (March 2002) 14(2): 296-315
    • (1998) IEEE Trans Knowl Data Eng , vol.14 , Issue.2 , pp. 296-315
    • Adam, N.1    Atluri, V.2    Bertino, E.3    Ferrari, E.4
  • 2
    • 0001335937 scopus 로고    scopus 로고
    • Strategic directions in electronic commerce and digital libraries: Towards a digital Agora
    • Adam N, et al (1996) Strategic directions in electronic commerce and digital libraries: towards a digital Agora. ACM Comput Surv 28(4)
    • (1996) ACM Comput Surv , vol.28 , Issue.4
    • Adam, N.1
  • 3
    • 0028374740 scopus 로고
    • An approach to authorization modeling in object-oriented database systems
    • Bertino E, Weigand H (1994) An approach to authorization modeling in object-oriented database systems. Data Knowl Eng 12(1)
    • (1994) Data Knowl Eng , vol.12 , Issue.1
    • Bertino, E.1    Weigand, H.2
  • 5
    • 0003226513 scopus 로고
    • Evaluation of negative, predicate, and instance-based authorization in object-oriented databases
    • Elsevier, Holland
    • Gudes E, Song H, Fernandez EB (1991) Evaluation of negative, predicate, and instance-based authorization in object-oriented databases. In: Database security, IV: status and prospects. Elsevier, Holland
    • (1991) Database Security, IV: Status and Prospects
    • Gudes, E.1    Song, H.2    Fernandez, E.B.3
  • 7
    • 0012922789 scopus 로고    scopus 로고
    • Center for Intelligent Information Retrieval, University of Massachusetts, Amherst, Mass., USA
    • Natural Language Processing Laboratory (1996) MARMOT subjects guide. Center for Intelligent Information Retrieval, University of Massachusetts, Amherst, Mass., USA
    • (1996) MARMOT Subjects Guide
  • 8
    • 0013014392 scopus 로고    scopus 로고
    • Center for Intelligent Information Retrieval, University of Massachusetts, Amherst, Mass., USA
    • Natural Language Processing Laboratory (1996) Task domain specification and user guide for BADGER and CRYSTAL. Center for Intelligent Information Retrieval, University of Massachusetts, Amherst, Mass., USA
    • (1996) Task Domain Specification and User Guide for BADGER and CRYSTAL
  • 10
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • Rabitti F, Bertino E, Kim W, Woelk D (1991) A model of authorization for next-generation database systems. ACM Trans Database Syst 16(1):88-131
    • (1991) ACM Trans Database Syst , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 11
    • 0030216932 scopus 로고    scopus 로고
    • An authorization model for a distributed hypertext system
    • Samarati P, Bertino E, Jajodia S (1996) An authorization model for a distributed hypertext system. IEEE Trans Knowl Data Eng 8(4):555-562
    • (1996) IEEE Trans Knowl Data Eng , vol.8 , Issue.4 , pp. 555-562
    • Samarati, P.1    Bertino, E.2    Jajodia, S.3
  • 12
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu R, et al (1996) Role-based access control models. IEEE Comput 32(9):38-47
    • (1996) IEEE Comput , vol.32 , Issue.9 , pp. 38-47
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.