-
1
-
-
35248867366
-
The Stanford Digital Library metadata architecture
-
Baldonado, M., Chang, K., Gravano, L.P. and Paepcke, A. (1997), “The Stanford Digital Library metadata architecture”, International Journal of Digital Libraries, Vol. 1 No. 2, pp. 108-121.
-
(1997)
International Journal of Digital Libraries
, vol.1
, Issue.2
, pp. 108-121
-
-
Baldonado, M.1
Chang, K.2
Gravano, L.P.3
Paepcke, A.4
-
2
-
-
0035330891
-
Securing XML documents with Author-X
-
Bertino, E., Castano, S. and Ferrari, E. (2001), “Securing XML documents with Author-X”, IEEE Internet Computing, Vol. 5 No. 3, pp. 21-31.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.3
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
3
-
-
0012736565
-
RBAC policies in XML for X.509 based privilege management
-
Ed. Ghonaimy, M.A., Ed. El-Hadidi, M.T. and Ed. Aslan, H.K. Kluwer Academic Publishers, Dordrecht available at: http://sec.isi.salford.ac.uk/download/Sec2002Final.pdf
-
Chadwick, D.W. and Otenko, A. (2002), “RBAC policies in XML for X.509 based privilege management”, in Ed. Ghonaimy, M.A., Ed. El-Hadidi, M.T. and Ed. Aslan, H.K. (Eds), Security in the Information Society: Visions and Perspectives, Kluwer Academic Publishers, Dordrecht, pp. 39-54, available at: http://sec.isi.salford.ac.uk/download/Sec2002Final.pdf
-
(2002)
Security in the Information Society: Visions and Perspectives
, pp. 39-54
-
-
Chadwick, D.W.1
Otenko, A.2
-
4
-
-
0038360253
-
Metadata rules the world: what else must we know about metadata?
-
available at: www.alexandria.ucsb.edu/ acoleman/mrworld.html
-
Coleman, A. (2002), “Metadata rules the world: what else must we know about metadata?”, available at: www.alexandria.ucsb.edu/ acoleman/mrworld.html
-
(2002)
-
-
Coleman, A.1
-
5
-
-
0035509987
-
Controlling access to XML documents
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. (2001), “Controlling access to XML documents”, IEEE Internet Computing, Vol. 5 No. 6, pp. 18-28.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 18-28
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. (2002), “A fine-grained access control system for XML documents”, ACM Transactions on Information and System Security (TISSEC), Vol. 5 No. 2, pp. 169-202.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
7
-
-
84904250030
-
Going beyond MAC and DAC using mobile policies
-
Ed. Dupuy, M. and Ed. Paradinas, P. Kluwer Academic Publishers, Dordrecht
-
Fayad, A., Jajodia, S., Faatz, D.B. and Doshi, V. (2001), “Going beyond MAC and DAC using mobile policies”, in Ed. Dupuy, M. and Ed. Paradinas, P. (Eds), Trusted Information: The New Decade Challenge, Kluwer Academic Publishers, Dordrecht, pp. 245-260.
-
(2001)
Trusted Information: The New Decade Challenge
, pp. 245-260
-
-
Fayad, A.1
Jajodia, S.2
Faatz, D.B.3
Doshi, V.4
-
8
-
-
84885819468
-
Recommendation X.509 – information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks
-
ITU available at: www.itu.int/rec/ recommendation.asp?type=items&lang= E&parent=T-REC-X.509-200003-I
-
ITU (2000), “Recommendation X.509 – information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks”, International Telecommunication Union, available at: www.itu.int/rec/ recommendation.asp?type=items&lang= E&parent=T-REC-X.509-200003-I
-
(2000)
International Telecommunication Union
-
-
-
9
-
-
0036995129
-
The ADEPT digital library architecture
-
ACM Press, Portland, OR available at: www.esm.ucsb.edu/fac_staff/fac/frew/cv/pubs/2002_ADEPT_architecture.pdf
-
Janée, G. and Frew, J. (2002), “The ADEPT digital library architecture”, Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries, ACM Press, Portland, OR, pp. 342-350, available at: www.esm.ucsb.edu/fac_staff/fac/frew/cv/pubs/2002_ADEPT_architecture.pdf
-
(2002)
Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries
, pp. 342-350
-
-
Janée, G.1
Frew, J.2
-
10
-
-
0030700163
-
Shopping models: a flexible architecture for information commerce
-
ACM Press, Portland, OR
-
Ketchpel, S., Garcia-Molina, H. and Paepcke, A. (1997), “Shopping models: a flexible architecture for information commerce”, Proceedings of the 2nd ACM International Conference on Digital Libraries, ACM Press, Portland, OR, pp. 65-74.
-
(1997)
Proceedings of the 2nd ACM International Conference on Digital Libraries
, pp. 65-74
-
-
Ketchpel, S.1
Garcia-Molina, H.2
Paepcke, A.3
-
11
-
-
0034450091
-
XML document security based on provisional authorisation
-
ACM Press, Portland, OR
-
Kudo, M. and Hada, S. (2000), “XML document security based on provisional authorisation”, Proceedings of the 7th ACM Conference on Computer and Communications Security, ACM Press, Portland, OR, pp. 87-96.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 87-96
-
-
Kudo, M.1
Hada, S.2
-
12
-
-
84867293994
-
XML-based distributed access control system
-
Ed. Bauknecht, K., Ed. Tjoa, A.M. and Ed. Quirchmayr, G. Springer-Verlag, Berlin
-
López, J., Maña, A. and Yagüe, M.I. (2002a), “XML-based distributed access control system”, in Ed. Bauknecht, K., Ed. Tjoa, A.M. and Ed. Quirchmayr, G. (Eds), Proceedings of the 3rd International Conference on E-commerce and Web Technologies, Springer-Verlag, Berlin, pp. 203-213.
-
(2002)
Proceedings of the 3rd International Conference on E-commerce and Web Technologies
, pp. 203-213
-
-
López, J.1
Maña, A.2
Yagüe, M.I.3
-
13
-
-
34250197762
-
Access control infrastructure for digital objects
-
Ed. Deng, R.H., Ed. Qing, S., Ed. Bao, F. and Ed. Zhou, J. Lecture Notes in Computer Science 2513, Springer-Verlag, Berlin
-
López, J., Maña, A., Pimentel, E., Troya, J.M. and Yagüe, M.I. (2002b), “Access control infrastructure for digital objects”, in Ed. Deng, R.H., Ed. Qing, S., Ed. Bao, F. and Ed. Zhou, J. (Eds), Proceedings of the 4th International Conference on Information and Communications Security, Lecture Notes in Computer Science 2513, Springer-Verlag, Berlin, pp. 399-410.
-
(2002)
Proceedings of the 4th International Conference on Information and Communications Security
, pp. 399-410
-
-
López, J.1
Maña, A.2
Pimentel, E.3
Yagüe, M.I.4
-
14
-
-
0025022888
-
Beyond the pale of MAC and DAC: defining new forms of access control
-
IEEE Computer Society Press, Los Alamitos, CA
-
McCollum, C.J., Messing, J.R. and Notargiacomo, L. (1990), “Beyond the pale of MAC and DAC: defining new forms of access control”, Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA, pp. 190-200.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
15
-
-
4244037629
-
An efficient software protection scheme
-
Ed. Dupuy, M. and Ed. Paradinas, P. Kluwer Academic Publishers, Dordrecht
-
Maña, A. and Pimentel, E. (2001), “An efficient software protection scheme”, in Ed. Dupuy, M. and Ed. Paradinas, P. (Eds), Trusted Information: The New Decade Challenge, Kluwer Academic Publishers, Dordrecht, pp. 385-402.
-
(2001)
Trusted Information: The New Decade Challenge
, pp. 385-402
-
-
Maña, A.1
Pimentel, E.2
-
16
-
-
2942654406
-
Certificate-based authorisation policy in a PKI environment
-
August
-
Thompson, M., Essiari, A. and Mudumbai, S. (2003), “Certificate-based authorisation policy in a PKI environment”, submitted to ACM Transactions on Information and System Security, August.
-
(2003)
ACM Transactions on Information and System Security
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
17
-
-
4243428421
-
On the suitability of existing access control and DRM languages for mobile policies
-
University of Málaga, Malaga
-
Yagüe, M.I. (2002), “On the suitability of existing access control and DRM languages for mobile policies”, Department of Computer Science Technical Report nb. LCC-ITI-2002/10, University of Málaga, Malaga.
-
(2002)
Department of Computer Science Technical Report nb. LCC-ITI-2002/10
-
-
Yagüe, M.I.1
|