메뉴 건너뛰기




Volumn 27, Issue 3, 2003, Pages 147-159

A secure solution for commercial digital libraries

Author keywords

Data security; Digital libraries; Distributed computing; Distribution requirements planning; Systems management

Indexed keywords

COMPUTER SOFTWARE; CONTROL SYSTEMS; DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA; XML;

EID: 0038681621     PISSN: 14684527     EISSN: None     Source Type: Journal    
DOI: 10.1108/14684520310481418     Document Type: Article
Times cited : (7)

References (17)
  • 2
    • 0035330891 scopus 로고    scopus 로고
    • Securing XML documents with Author-X
    • Bertino, E., Castano, S. and Ferrari, E. (2001), “Securing XML documents with Author-X”, IEEE Internet Computing, Vol. 5 No. 3, pp. 21-31.
    • (2001) IEEE Internet Computing , vol.5 , Issue.3 , pp. 21-31
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 3
    • 0012736565 scopus 로고    scopus 로고
    • RBAC policies in XML for X.509 based privilege management
    • Ed. Ghonaimy, M.A., Ed. El-Hadidi, M.T. and Ed. Aslan, H.K. Kluwer Academic Publishers, Dordrecht available at: http://sec.isi.salford.ac.uk/download/Sec2002Final.pdf
    • Chadwick, D.W. and Otenko, A. (2002), “RBAC policies in XML for X.509 based privilege management”, in Ed. Ghonaimy, M.A., Ed. El-Hadidi, M.T. and Ed. Aslan, H.K. (Eds), Security in the Information Society: Visions and Perspectives, Kluwer Academic Publishers, Dordrecht, pp. 39-54, available at: http://sec.isi.salford.ac.uk/download/Sec2002Final.pdf
    • (2002) Security in the Information Society: Visions and Perspectives , pp. 39-54
    • Chadwick, D.W.1    Otenko, A.2
  • 4
    • 0038360253 scopus 로고    scopus 로고
    • Metadata rules the world: what else must we know about metadata?
    • available at: www.alexandria.ucsb.edu/ acoleman/mrworld.html
    • Coleman, A. (2002), “Metadata rules the world: what else must we know about metadata?”, available at: www.alexandria.ucsb.edu/ acoleman/mrworld.html
    • (2002)
    • Coleman, A.1
  • 7
    • 84904250030 scopus 로고    scopus 로고
    • Going beyond MAC and DAC using mobile policies
    • Ed. Dupuy, M. and Ed. Paradinas, P. Kluwer Academic Publishers, Dordrecht
    • Fayad, A., Jajodia, S., Faatz, D.B. and Doshi, V. (2001), “Going beyond MAC and DAC using mobile policies”, in Ed. Dupuy, M. and Ed. Paradinas, P. (Eds), Trusted Information: The New Decade Challenge, Kluwer Academic Publishers, Dordrecht, pp. 245-260.
    • (2001) Trusted Information: The New Decade Challenge , pp. 245-260
    • Fayad, A.1    Jajodia, S.2    Faatz, D.B.3    Doshi, V.4
  • 8
    • 84885819468 scopus 로고    scopus 로고
    • Recommendation X.509 – information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks
    • ITU available at: www.itu.int/rec/ recommendation.asp?type=items&lang= E&parent=T-REC-X.509-200003-I
    • ITU (2000), “Recommendation X.509 – information technology – open systems interconnection – the directory: public-key and attribute certificate frameworks”, International Telecommunication Union, available at: www.itu.int/rec/ recommendation.asp?type=items&lang= E&parent=T-REC-X.509-200003-I
    • (2000) International Telecommunication Union
  • 9
    • 0036995129 scopus 로고    scopus 로고
    • The ADEPT digital library architecture
    • ACM Press, Portland, OR available at: www.esm.ucsb.edu/fac_staff/fac/frew/cv/pubs/2002_ADEPT_architecture.pdf
    • Janée, G. and Frew, J. (2002), “The ADEPT digital library architecture”, Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries, ACM Press, Portland, OR, pp. 342-350, available at: www.esm.ucsb.edu/fac_staff/fac/frew/cv/pubs/2002_ADEPT_architecture.pdf
    • (2002) Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries , pp. 342-350
    • Janée, G.1    Frew, J.2
  • 13
    • 34250197762 scopus 로고    scopus 로고
    • Access control infrastructure for digital objects
    • Ed. Deng, R.H., Ed. Qing, S., Ed. Bao, F. and Ed. Zhou, J. Lecture Notes in Computer Science 2513, Springer-Verlag, Berlin
    • López, J., Maña, A., Pimentel, E., Troya, J.M. and Yagüe, M.I. (2002b), “Access control infrastructure for digital objects”, in Ed. Deng, R.H., Ed. Qing, S., Ed. Bao, F. and Ed. Zhou, J. (Eds), Proceedings of the 4th International Conference on Information and Communications Security, Lecture Notes in Computer Science 2513, Springer-Verlag, Berlin, pp. 399-410.
    • (2002) Proceedings of the 4th International Conference on Information and Communications Security , pp. 399-410
    • López, J.1    Maña, A.2    Pimentel, E.3    Yagüe, M.I.4
  • 14
  • 15
    • 4244037629 scopus 로고    scopus 로고
    • An efficient software protection scheme
    • Ed. Dupuy, M. and Ed. Paradinas, P. Kluwer Academic Publishers, Dordrecht
    • Maña, A. and Pimentel, E. (2001), “An efficient software protection scheme”, in Ed. Dupuy, M. and Ed. Paradinas, P. (Eds), Trusted Information: The New Decade Challenge, Kluwer Academic Publishers, Dordrecht, pp. 385-402.
    • (2001) Trusted Information: The New Decade Challenge , pp. 385-402
    • Maña, A.1    Pimentel, E.2
  • 17
    • 4243428421 scopus 로고    scopus 로고
    • On the suitability of existing access control and DRM languages for mobile policies
    • University of Málaga, Malaga
    • Yagüe, M.I. (2002), “On the suitability of existing access control and DRM languages for mobile policies”, Department of Computer Science Technical Report nb. LCC-ITI-2002/10, University of Málaga, Malaga.
    • (2002) Department of Computer Science Technical Report nb. LCC-ITI-2002/10
    • Yagüe, M.I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.