메뉴 건너뛰기




Volumn 29, Issue 2, 2004, Pages 363-402

A compressed accessibility map for XML

Author keywords

Access control; Structural locality; XML

Indexed keywords

ACCESS CONTROL; COMPRESSED ACCESSIBILITY MAPS (CAM); EXPERIMENTATIONS; STRUCTURAL LOCALITY;

EID: 3142624792     PISSN: 03625915     EISSN: None     Source Type: Journal    
DOI: 10.1145/1005566.1005570     Document Type: Review
Times cited : (20)

References (29)
  • 1
    • 84862377572 scopus 로고    scopus 로고
    • ACCESS CONTROL. 1998. Access control programmer's guide. Available from http://developer. netscape.com:80/docs/manuals/enterprise/accessapi/contents. htm.
    • (1998) Access Control Programmer's Guide
  • 5
    • 85134887303 scopus 로고    scopus 로고
    • Specifying and enforcing access control policies for XML document sources
    • BERTINO, E., CASTANO, S., FERRARI, E., AND MESITI, M. 2000b. Specifying and enforcing access control policies for XML document sources. World Wide Web J. 3, 3.
    • (2000) World Wide Web J. , vol.3 , pp. 3
    • Bertino, E.1    Castano, S.2    Ferrari, E.3    Mesiti, M.4
  • 6
    • 0030732547 scopus 로고    scopus 로고
    • An extended authorization model for relational databases
    • BERTINO, E., SAMARATI, P., AND JAJODIA, S. 1997. An extended authorization model for relational databases. IEEE Trans. Knowl. Data Eng. 9, 1, 85-101.
    • (1997) IEEE Trans. Knowl. Data Eng. , vol.9 , Issue.1 , pp. 85-101
    • Bertino, E.1    Samarati, P.2    Jajodia, S.3
  • 10
    • 0033723110 scopus 로고    scopus 로고
    • Design and implementation of an access control processor for XML documents
    • Also in WWW9
    • DAMIANI, E., DI VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2000b. Design and implementation of an access control processor for XML documents. Comput. Netw. 33, 1-6, 59-75. Also in WWW9.
    • (2000) Comput. Netw. , vol.33 , Issue.1-6 , pp. 59-75
    • Damiani, E.1    Di Vimercati, S.D.C.2    Paraboschi, S.3    Samarati, P.4
  • 12
    • 0018008817 scopus 로고
    • On an authorization mechanism
    • FAGIN, R. 1978. On an authorization mechanism. ACM Trans. Database Syst. 3, 3, 310-319.
    • (1978) ACM Trans. Database Syst. , vol.3 , Issue.3 , pp. 310-319
    • Fagin, R.1
  • 14
    • 0000950910 scopus 로고    scopus 로고
    • The string B-tree: A new data structure for string search in external memory and its applications
    • FERRAGINA, P. AND GROSSI, R. 1999. The string B-tree: A new data structure for string search in external memory and its applications. J. ACM 46, 2 (Mar.), 236-280.
    • (1999) J. ACM , vol.46 , Issue.2 MAR. , pp. 236-280
    • Ferragina, P.1    Grossi, R.2
  • 16
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • GRIFFITHS, P. P. AND WADE, B. W. 1976. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3, 242-255.
    • (1976) ACM Trans. Database Syst. , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 23
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control
    • OSBORN, S. L., SANDHU, R. S., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control. IEEE Trans. on Information Security 3, 2, 85-106.
    • (2000) IEEE Trans. on Information Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.S.2    Munawer, Q.3
  • 24
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • RABITTI, F., BERTINO, E., KIM, W., AND WOELK, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1, 88-131.
    • (1991) ACM Trans. Database Syst. , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 25
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • SANDHU, R. S. 1993. Lattice-based access control models. IEEE Comput. 26,11, 9-19.
    • (1993) IEEE Comput. , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 28
    • 0028720693 scopus 로고
    • Formal query languages for secure relational databases
    • WINSLETT, M., SMITH, K., AND QIAN, X. 1994. Formal query languages for secure relational databases. ACM Trans. Database Syst. 19, 4, 626-662.
    • (1994) ACM Trans. Database Syst. , vol.19 , Issue.4 , pp. 626-662
    • Winslett, M.1    Smith, K.2    Qian, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.