-
1
-
-
0345081326
-
-
Aberdeen Group: Market Analysis and Positioning Services for Business Technology
-
Aberdeen Group: Market Analysis and Positioning Services for Business Technology, www.aberdeen.com.
-
-
-
-
2
-
-
84976744860
-
Ode (object database and environment): The language and the data model
-
R. Agrawal and N.H. Gehani, 'Ode (object database and environment): The language and the data model', Proc 1989 ACM-SIGMOD Conf. on Management of Data, Portland, Oregon, June 1989.
-
Proc 1989 ACM-SIGMOD Conf. on Management of Data, Portland, Oregon, June 1989
-
-
Agrawal, R.1
Gehani, N.H.2
-
3
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
IEEE Computer Society Press, May
-
Baldwin R.W., "Naming and Grouping privileges to Simplify Security Management in Large Databases", in proceedings of 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, May 1990.
-
(1990)
Proceedings of 1990 IEEE Symposium on Research in Security and Privacy
-
-
Baldwin, R.W.1
-
4
-
-
84893074859
-
A system to specify and manage multipolicy access control model
-
E. Bertino, B. Catania, E. Ferrari and P. Perlasca, 'A System to specify and Manage Multipolicy Access Control Model', 3rd IEEE International Workshop on Policies for Distributed Systems and Networks, California, 2002, pp. 116-127.
-
3rd IEEE International Workshop on Policies for Distributed Systems and Networks, California, 2002
, pp. 116-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
5
-
-
0345081324
-
Administration policies in a multipolicy autorization system
-
Elisa Bertino, Elena Ferrari, 'Administration Policies in a Multipolicy Autorization System', DBSec 1997: 341-355.
-
DBSec 1997:
, pp. 341-355
-
-
Bertino, E.1
Ferrari, E.2
-
7
-
-
0030674175
-
Modeling business rules with situation/activation diagrams
-
Peter Lang, Werner Obermair, Michael Schrefl, 'Modeling Business Rules with Situation/Activation Diagrams', 13th International Conference on Data Engineering, pages 455-464, 1997.
-
(1997)
13th International Conference on Data Engineering
, pp. 455-464
-
-
Lang, P.1
Obermair, W.2
Schrefl, M.3
-
8
-
-
0003054727
-
Access control policies for database systems
-
In C. Landwehr, editor; North-Holland
-
T. Lunt. Access control policies for database systems. In C. Landwehr, editor, Database Security II: Status and Prospects, pages, 41-52, North-Holland, 1989.
-
(1989)
Database Security II: Status and Prospects
, pp. 41-52
-
-
Lunt, T.1
-
9
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
Emil Lupu, Morris Sloman, 'Conflicts in Policy-Based Distributed Systems Management'. IEEE Transactions on Software Engineering (TSE) 25(6), 1999, pp. 852-869.
-
(1999)
IEEE Transactions on Software Engineering (TSE)
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
13
-
-
0028262048
-
Implementing calendars and temporal rules in next generation databases
-
R. Chandra, S. Segev, and M. Stonebreaker, 'Implementing calendars and temporal rules in next generation databases', International Conference on Data Engineering, Houston, Texas, USA, February 1994.
-
International Conference on Data Engineering, Houston, Texas, USA, February 1994
-
-
Chandra, R.1
Segev, S.2
Stonebreaker, M.3
-
14
-
-
84944048132
-
The ponder policy specification language
-
Nicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman: The Ponder Policy Specification Language. 2nd IEEE International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, 2001, pp. 18-38.
-
2nd IEEE International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, 2001
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
15
-
-
84974721118
-
The HiPAC project: Combining active databases and timing constraints
-
March
-
U. Dayal et al., 'The HiPAC Project: Combining Active Databases and Timing Constraints', ACM SIGMOD Record, 17:1, March 1988.
-
(1988)
ACM SIGMOD Record
, vol.17
, pp. 1
-
-
Dayal, U.1
-
17
-
-
0029716497
-
Managing conflicts between rules
-
H.V. Jagadish, A.O. Mendelzon, and I.S. Mumick, 'Managing Conflicts between Rules', 15th ACM International Conference on Principles of Database Systems, Montreal, 1996, pp 192-201.
-
15th ACM International Conference on Principles of Database Systems, Montreal, 1996
, pp. 192-201
-
-
Jagadish, H.V.1
Mendelzon, A.O.2
Mumick, I.S.3
-
19
-
-
84976690293
-
The architecture of an active data base management system
-
D McCarthy and U. Dayal, 'The architecture of an active data base management system', Proc 1989 ACM-SIGMOD Conf. on Management Data, Portland, Oregon, June 1989.
-
Proc 1989 ACM-SIGMOD Conf. on Management Data, Portland, Oregon, June 1989
-
-
McCarthy, D.1
Dayal, U.2
-
20
-
-
0026119329
-
A model of authorization for next-generation database systems
-
March
-
F. Rabbiti, E.Bertino, W.Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Transactions on Database Systems, 16(1):89-131, March 1991.
-
(1991)
ACM Transactions on Database Systems
, vol.16
, Issue.1
, pp. 89-131
-
-
Rabbiti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
21
-
-
0030086382
-
Role-based access control models
-
February
-
R.S. Sandhu, E.J. Coyne, H.L.Feinstein and C.E.Youman, "Role-based Access Control Models", IEEE Computer, pp. 38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
0010047050
-
Secure computing
-
McGraw-Hill, New York
-
Summers, R.C., "Secure Computing", McGraw-Hill, New York (1997)
-
(1997)
-
-
Summers, R.C.1
-
23
-
-
0344650469
-
-
Implementing Dynamic Rules in an Access Manager Environment
-
Implementing Dynamic Rules in an Access Manager Environment, www.tivoli.com
-
-
-
|