-
1
-
-
84862377572
-
-
ACCESS CONTROL. 1998. Access control programmer's guide. Available from http://developer. netscape.com:80/docs/manuals/enterprise/accessapi/contents. htm.
-
(1998)
Access Control Programmer's Guide
-
-
-
2
-
-
4644270171
-
AuthorX: A Java-based system for XML data protection
-
Schoorl, The Netherlands
-
BERTINO, E., BRAUN, M., CASTANO, S., FERRARI, E., AND MESITI, M. 2000a. AuthorX: A Java-based system for XML data protection. In Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security. Schoorl, The Netherlands.
-
(2000)
Proceedings of the 14th Annual IFIP WG 11.3 Working Conference on Database Security
-
-
Bertino, E.1
Braun, M.2
Castano, S.3
Ferrari, E.4
Mesiti, M.5
-
3
-
-
0035330891
-
Securing XML documents with Author-X
-
BERTINO, E., CASTANO, S., AND FERRARI, E. 2001. Securing XML documents with Author-X. IEEE Inter. Comput. 5, 3, 21-31.
-
(2001)
IEEE Inter. Comput.
, vol.5
, Issue.3
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
84989880098
-
Controlled access and dissemination of XML documents
-
BERTINO, E., CASTANO, S., FERRARI, E., AND MESITI, M. 1999. Controlled access and dissemination of XML documents. In Proceedings of the Workshop on Web Information and Data Management. 22-27.
-
(1999)
Proceedings of the Workshop on Web Information and Data Management
, pp. 22-27
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
5
-
-
85134887303
-
Specifying and enforcing access control policies for XML document sources
-
BERTINO, E., CASTANO, S., FERRARI, E., AND MESITI, M. 2000b. Specifying and enforcing access control policies for XML document sources. World Wide Web J. 3, 3.
-
(2000)
World Wide Web J.
, vol.3
, pp. 3
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
6
-
-
0030732547
-
An extended authorization model for relational databases
-
BERTINO, E., SAMARATI, P., AND JAJODIA, S. 1997. An extended authorization model for relational databases. IEEE Trans. Knowl. Data Eng. 9, 1, 85-101.
-
(1997)
IEEE Trans. Knowl. Data Eng.
, vol.9
, Issue.1
, pp. 85-101
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
7
-
-
0029760798
-
Secure mediated databases
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
CANDAN, K. S., JAJODIA, S., AND SUBRAHMANIAN, V. S. 1996. Secure mediated databases. In Proceedings of the IEEE International Conference on Data Engineering. IEEE Computer Society Press, Los Alamitos, Calif.
-
(1996)
Proceedings of the IEEE International Conference on Data Engineering
-
-
Candan, K.S.1
Jajodia, S.2
Subrahmanian, V.S.3
-
8
-
-
1542701202
-
Optimizing the secure evaluation of twig queries
-
CHO, S., AMER-YAHIA, S., LAKSHMANAN, L. V. S., AND SRIVASTAVA, D. 2002. Optimizing the secure evaluation of twig queries. In Proceedings of the International Conference on Very Large Databases.
-
(2002)
Proceedings of the International Conference on Very Large Databases
-
-
Cho, S.1
Amer-Yahia, S.2
Lakshmanan, L.V.S.3
Srivastava, D.4
-
9
-
-
0037889209
-
Securing XML documents
-
DAMIANI, E., DI VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2000a. Securing XML documents. In Proceedings of the International Conference on Extending Database Technology.
-
(2000)
Proceedings of the International Conference on Extending Database Technology
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
10
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
Also in WWW9
-
DAMIANI, E., DI VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2000b. Design and implementation of an access control processor for XML documents. Comput. Netw. 33, 1-6, 59-75. Also in WWW9.
-
(2000)
Comput. Netw.
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
12
-
-
0018008817
-
On an authorization mechanism
-
FAGIN, R. 1978. On an authorization mechanism. ACM Trans. Database Syst. 3, 3, 310-319.
-
(1978)
ACM Trans. Database Syst.
, vol.3
, Issue.3
, pp. 310-319
-
-
Fagin, R.1
-
13
-
-
2942747386
-
XQuery 1.0 and XPath 2.0 data model
-
FERNANDEZ, M. F., MALHOTRA, A., MARSH, J., NAOY, M., AND WALSH, N. 2002. XQuery 1.0 and XPath 2.0 data model. W3C Working Draft. Available from http://www.w3.org/TR/query-datamodel/.
-
(2002)
W3C Working Draft
-
-
Fernandez, M.F.1
Malhotra, A.2
Marsh, J.3
Naoy, M.4
Walsh, N.5
-
14
-
-
0000950910
-
The string B-tree: A new data structure for string search in external memory and its applications
-
FERRAGINA, P. AND GROSSI, R. 1999. The string B-tree: A new data structure for string search in external memory and its applications. J. ACM 46, 2 (Mar.), 236-280.
-
(1999)
J. ACM
, vol.46
, Issue.2 MAR.
, pp. 236-280
-
-
Ferragina, P.1
Grossi, R.2
-
16
-
-
84976657250
-
An authorization mechanism for a relational database system
-
GRIFFITHS, P. P. AND WADE, B. W. 1976. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3, 242-255.
-
(1976)
ACM Trans. Database Syst.
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
18
-
-
0041032318
-
On effective multi-dimensional indexing for strings
-
ACM, New York
-
JAGADISH, H. V., KOUDAS, N., AND SRIVASTAVA, D. 2000. On effective multi-dimensional indexing for strings. In Proceedings of the ACM SIGMOD Conference on Management of Data. ACM, New York.
-
(2000)
Proceedings of the ACM SIGMOD Conference on Management of Data
-
-
Jagadish, H.V.1
Koudas, N.2
Srivastava, D.3
-
19
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
ACM, New York
-
JAJODIA, S., SAMARATI, P., SUBRAHMANIAN, V. S., AND BERTINO, E. 1997. A unified framework for enforcing multiple access control policies. In Proceedings of the ACM SIGMOD Conference on Management of Data. ACM, New York.
-
(1997)
Proceedings of the ACM SIGMOD Conference on Management of Data
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
22
-
-
0025442003
-
The SeaView security model
-
York. LUNT, T. F., DENNING, D. E., SCHELL, R. R., HECKMAN, M., AND SHOCKLEY, W. R. 1990. The SeaView security model. IEEE Trans. Softw. Eng. 16, 6, 593-607.
-
(1990)
IEEE Trans. Softw. Eng.
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
23
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control
-
OSBORN, S. L., SANDHU, R. S., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control. IEEE Trans. on Information Security 3, 2, 85-106.
-
(2000)
IEEE Trans. on Information Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.S.2
Munawer, Q.3
-
24
-
-
0026119329
-
A model of authorization for next-generation database systems
-
RABITTI, F., BERTINO, E., KIM, W., AND WOELK, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1, 88-131.
-
(1991)
ACM Trans. Database Syst.
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
25
-
-
0027699087
-
Lattice-based access control models
-
SANDHU, R. S. 1993. Lattice-based access control models. IEEE Comput. 26,11, 9-19.
-
(1993)
IEEE Comput.
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
26
-
-
0030086382
-
Bole-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Bole-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
0028720693
-
Formal query languages for secure relational databases
-
WINSLETT, M., SMITH, K., AND QIAN, X. 1994. Formal query languages for secure relational databases. ACM Trans. Database Syst. 19, 4, 626-662.
-
(1994)
ACM Trans. Database Syst.
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
29
-
-
1442272725
-
Compressed accessibility map: Efficient access control for XML
-
YU, T., SEIVASTAVA, D., LAKSHMANAN, L. V. S., AND JAGADISH, H. V. 2002. Compressed accessibility map: Efficient access control for XML. In Proceedings of the International Conference on Very Large Databases. 478-489.
-
(2002)
Proceedings of the International Conference on Very Large Databases
, pp. 478-489
-
-
Yu, T.1
Seivastava, D.2
Lakshmanan, L.V.S.3
Jagadish, H.V.4
|