메뉴 건너뛰기




Volumn 37, Issue 4, 2004, Pages 41-49

XML-based specification for web services document security

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER SOFTWARE; DIGITAL LIBRARIES; ELECTRONIC COMMERCE; INFORMATION DISSEMINATION; NETWORK PROTOCOLS; SECURITY OF DATA; SEMANTICS; WORLD WIDE WEB;

EID: 1942532238     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2004.1297300     Document Type: Article
Times cited : (76)

References (10)
  • 1
  • 2
    • 85001697848 scopus 로고    scopus 로고
    • A fine-grained access control system for XML documents
    • ACM Press
    • E. Damiani et al., "A Fine-Grained Access Control System for XML Documents," ACM Trans. Information and System Security (TISSEC), vol. 5, no. 2, ACM Press, 2002, pp. 169-202.
    • (2002) ACM Trans. Information and System Security (TISSEC) , vol.5 , Issue.2 , pp. 169-202
    • Damiani, E.1
  • 3
    • 0142039819 scopus 로고    scopus 로고
    • Guest editor's introduction - Web services computing: Advancing software interoperability
    • Oct.
    • J.Y. Chung, K.J. Lin, and R.G. Mathieu, "Guest Editor's Introduction - Web Services Computing: Advancing Software Interoperability," Computer Oct. 2003, pp. 35-37.
    • (2003) Computer , pp. 35-37
    • Chung, J.Y.1    Lin, K.J.2    Mathieu, R.G.3
  • 4
    • 0000206310 scopus 로고    scopus 로고
    • Security models for web-based applications
    • Feb.
    • J.B.D. Joshi et al., "Security Models for Web-Based Applications," Comm. ACM, Feb. 2001, p. 38-72.
    • (2001) Comm. ACM , pp. 38-72
    • Joshi, J.B.D.1
  • 5
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb.
    • R.S. Sandhu et al., "Role-Based Access Control Models," Computer, Feb. 1996, pp. 38-47.
    • (1996) Computer , pp. 38-47
    • Sandhu, R.S.1
  • 6
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • ACM Press
    • S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security (TISSEC), vol. 3, no. 2, ACM Press, 2000, pp. 85-106.
    • (2000) ACM Trans. Information and System Security (TISSEC) , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 7
    • 0344807687 scopus 로고    scopus 로고
    • XML access control language: Provisional authorization for XML documents
    • 16 Oct.; Tokyo Research Laboratory, IBM Research
    • S. Hada and M. Kudo, "XML Access Control Language: Provisional Authorization for XML Documents," 16 Oct. 2000, Tokyo Research Laboratory, IBM Research.
    • (2000)
    • Hada, S.1    Kudo, M.2
  • 9
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • ACM Press
    • D.F. Ferraiolo et al., "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and System Security (TISSEC), vol. 4, no. 3, ACM Press, 2001, pp. 224-274.
    • (2001) ACM Trans. Information and System Security (TISSEC) , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.F.1
  • 10
    • 0028016880 scopus 로고
    • A machine learning approach to document retrieval: An overview and an experiment
    • IEEE CS Press
    • H. Chen, "A Machine Learning Approach to Document Retrieval: An Overview and an Experiment," Proc. 27th Hawaii Int'l Conf. System Sciences vol. 3, IEEE CS Press, 1994, pp. 631-640.
    • (1994) Proc. 27th Hawaii Int'l Conf. System Sciences , vol.3 , pp. 631-640
    • Chen, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.