-
1
-
-
28444449426
-
Data privacy through optimal K-anonymization
-
(April), Tokyo, Japan
-
Bayardo, R. J., Jr., & Agrawal, R. (2005, April). Data privacy through optimal K-anonymization. In Proceedings of the 21st International Conference on Data Engineering (ICDE 2005) (pp. 217-228), Tokyo, Japan.
-
(2005)
Proceedings of the 21st International Conference on Data Engineering (ICDE 2005)
, pp. 217-228
-
-
Bayardo Jr., R.J.1
Agrawal, R.2
-
2
-
-
84969577592
-
XML security using XSLT
-
(January), Big Island, HI
-
Bartlett, R. G., & Cook, M. W. (2003, January). XML security using XSLT. In Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS), 4(4) (p. 122b), Big Island, HI.
-
(2003)
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS)
, vol.4
, Issue.4
-
-
Bartlett, R.G.1
Cook, M.W.2
-
4
-
-
11244343640
-
Policy contexts: Controlling information flow in parameterized RBAC
-
(June), Como, Italy
-
Belokosztolszki, A., Eyers, D. M., & Moody, K. (2003, June). Policy contexts: Controlling information flow in parameterized RBAC. In Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks (pp. 99-110), Como, Italy.
-
(2003)
Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 99-110
-
-
Belokosztolszki, A.1
Eyers, D.M.2
Moody, K.3
-
5
-
-
0346203703
-
Exception-based information flow control in object-oriented systems
-
Bertiuo, E., di Vimercati, S. C., Ferrari, E., & Samarati, P. (1998). Exception-based information flow control in object-oriented systems. ACM Transactions on Information and System. Security (TISSEC), 1(1), 26-65.
-
(1998)
ACM Transactions on Information and System. Security (TISSEC)
, vol.1
, Issue.1
, pp. 26-65
-
-
Bertiuo, E.1
Di Vimercati, S.C.2
Ferrari, E.3
Samarati, P.4
-
6
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
Bertino, E., & Ferrari, E. (2002). Secure and selective dissemination of XML documents. ACM Transactions on Information and System Security (TISSEC), 5(3), 290-331.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
7
-
-
84937420536
-
Securing XML documents
-
(March), Konstanz, Germany
-
Damiani, E., di Vimercati, S. C., Paraboschi, S., & Samarati, P. (2000, March). Securing XML documents. In Proceedings of the 2000 International Conference on Extending Database Technology (EDBT 2000) (pp. 121-135), Konstanz, Germany.
-
(2000)
Proceedings of the 2000 International Conference on Extending Database Technology (EDBT 2000)
, pp. 121-135
-
-
Damiani, E.1
Di Vimercati, S.C.2
Paraboschi, S.3
Samarati, P.4
-
8
-
-
84976482712
-
Fine grained access control for SOAP e-services
-
(May), Hong Kong
-
Damiani, E., di Vimercati, S. C., Paraboschi, S., & Samarati, P. (2001, May). Fine grained access control for SOAP e-services. In Proceedings of the 10th International World Wide Web Conference (WWW10) (pp. 504-513), Hong Kong.
-
(2001)
Proceedings of the 10th International World Wide Web Conference (WWW10)
, pp. 504-513
-
-
Damiani, E.1
Di Vimercati, S.C.2
Paraboschi, S.3
Samarati, P.4
-
9
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., di Vimercati, S. C., Paraboschi, S., & Samarati, P. (2002a). A fine-grained access control system for XML documents. ACM Transactions of Information and System Security (TISSEC), 5(2), 169-202.
-
(2002)
ACM Transactions of Information and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Di Vimercati, S.C.2
Paraboschi, S.3
Samarati, P.4
-
10
-
-
0141908648
-
Securing SOAP e-services
-
Damiani, E., di Vimercati, S. C., Paraboschi, S., & Samarati, P. (2002b). Securing SOAP e-services. International Journal of Information Security, 1(2), 100-115.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 100-115
-
-
Damiani, E.1
Di Vimercati, S.C.2
Paraboschi, S.3
Samarati, P.4
-
11
-
-
1842691672
-
-
Upper Saddle River, N.J: Prentice Hall
-
Deitel, H. M., Deitel, P. J., DuWaldt, B., & Trees, L. K. (2003). Web services, A technical introduction. Upper Saddle River, N.J: Prentice Hall.
-
(2003)
Web Services, a Technical Introduction
-
-
Deitel, H.M.1
Deitel, P.J.2
Duwaldt, B.3
Trees, L.K.4
-
12
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D. E. (1976). A lattice model of secure information flow. Communications of the ACM, 19(5), 236-243.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
13
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning, D. E., & Denning, P. J. (1977). Certification of programs for secure information flow. Communications of the ACM, 20(7), 504-513.
-
(1977)
Communications of the ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
14
-
-
0035748036
-
Flexible authentication of XML documents
-
(November), Philadelphia, PA
-
Devanbu, P., Gertz, M., Kwoug, A., Martel, C., Nuckolls, G., & Stubblebine, S. G. (2001, November). Flexible authentication of XML documents. In Proceedings of the 8th ACM Conference on Computer and Communications Security (pp. 136-145), Philadelphia, PA.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 136-145
-
-
Devanbu, P.1
Gertz, M.2
Kwoug, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.G.6
-
15
-
-
0038343548
-
Access control: Principles and solutions
-
di Vimercati, S. C., Paraboschi, S., & Samarati, P. (2003). Access control: Principles and solutions. Software - Practice and Experience, 33(5), 397-421.
-
(2003)
Software - Practice and Experience
, vol.33
, Issue.5
, pp. 397-421
-
-
Di Vimercati, S.C.1
Paraboschi, S.2
Samarati, P.3
-
16
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
(May), Oakland, CA
-
Ferrari, E., Samarati, P., Bertino, E., & Jajodia, S. (1997, May). Providing flexibility in information flow control for object-oriented systems. In Proceedings of the IEEE Symposium on Security and Privacy (p. 130), Oakland, CA.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 130
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
17
-
-
3543090739
-
Regulating access to XML documents
-
(July), Niagara, Ontario, Canada
-
Gabillon, A., & Bruno, E. (2001, July). Regulating access to XML documents. In Proceedings of the 15th Annual IFIP WG 11.3 Working Conference on Database Security (pp. 299-314), Niagara, Ontario, Canada.
-
(2001)
Proceedings of the 15th Annual IFIP WG 11.3 Working Conference on Database Security
, pp. 299-314
-
-
Gabillon, A.1
Bruno, E.2
-
18
-
-
4544228476
-
Towards standardized Web services privacy technologies
-
(July), San Diego, CA
-
Hung, P. C. K., Ferrari, E., & Carminati B. (2004, July). Towards standardized Web services privacy technologies. In Proceedings of the International Conference on Web Services (ICWS'04) (p. 174), San Diego, CA.
-
(2004)
Proceedings of the International Conference on Web Services (ICWS'04)
, pp. 174
-
-
Hung, P.C.K.1
Ferrari, E.2
Carminati, B.3
-
19
-
-
0017971337
-
A language expression for expressing constraints on data
-
Jones, A. K., & Liskov, B. H. (1978). A language expression for expressing constraints on data. Communications of the ACM, 21(5), 358-367.
-
(1978)
Communications of the ACM
, vol.21
, Issue.5
, pp. 358-367
-
-
Jones, A.K.1
Liskov, B.H.2
-
20
-
-
0141998521
-
Dynamically authorized role-based access control for secure distributed computation
-
(November), Fairfax, VA
-
Kuo, C. J., & Humenn, P. (2002, November). Dynamically authorized role-based access control for secure distributed computation. In Proceedings of the 2002 ACM Workshop on XML Security (pp. 97-103), Fairfax, VA.
-
(2002)
Proceedings of the 2002 ACM Workshop on XML Security
, pp. 97-103
-
-
Kuo, C.J.1
Humenn, P.2
-
21
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B. W. (1973). A note on the confinement problem. Communications of the ACM, 16(10), 613-615.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
23
-
-
33645520924
-
Analyzing information-flow in Java program based on slicing technique
-
Li, B. (2002). Analyzing information-flow in Java program based on slicing technique. ACM SIGSOFT Software Engineering Notes, 27(5), 98-103.
-
(2002)
ACM SIGSOFT Software Engineering Notes
, vol.27
, Issue.5
, pp. 98-103
-
-
Li, B.1
-
24
-
-
0032646625
-
Practical mostly-static information flow control
-
(January), San Antonio, TX
-
Myers, A. C., & Flow, J. (1999, January). Practical mostly-static information flow control. In Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (pp. 228-241), San Antonio, TX.
-
(1999)
Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
Flow, J.2
-
25
-
-
0031543270
-
A decentralized model for information flow control
-
(October), Saint-Malo, France
-
Myers, A. C., & Liskov, B. (1997, October). A decentralized model for information flow control. In Proceedings of the 16th ACM Symposium, on Operating Systems Principles (pp. 129-142), Saint-Malo, France.
-
(1997)
Proceedings of the 16th ACM Symposium, on Operating Systems Principles
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
26
-
-
0031682833
-
Complete safe information flow with decentralized labels
-
(May), Oakland, CA
-
Myers, A. C., & Liskov, B. (1998, May). Complete safe information flow with decentralized labels. In Proceedings of the 1998 IEEE Symposium on Security and Privacy (pp. 186-197), Oakland, CA.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
27
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
Myers, A. C., & Liskov, B. (2000). Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology, 9(4), 410-442.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
30
-
-
84994391858
-
Role-based access control on the Web
-
Park, J. S., Sandhu, R., & Ahn, G. J. (2001). Role-based access control on the Web. ACM Transactions on Information and System Security, 4(1), 37-71.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.J.3
-
31
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
(June), Monterey, CA
-
Park, J., & Sandhu, R. (2002, June). Towards usage control models: Beyond traditional access control. In Proceedings of the ACM Symposium on Access Control Models and Technologies (pp. 57-64), Monterey, CA.
-
(2002)
Proceedings of the ACM Symposium on Access Control Models and Technologies
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
-
32
-
-
1542300219
-
Preserving privacy in Web services
-
(November), McLean, VA
-
Rezgui, A., Ouzzani, M., Bouguettaya, A., & Medjahed, B. (2002, November). Preserving privacy in Web services. In Proceedings of the 4th International ACM Workshop on Web Information and Data Management WIDM'02 (pp. 56-62), McLean, VA.
-
(2002)
Proceedings of the 4th International ACM Workshop on Web Information and Data Management WIDM'02
, pp. 56-62
-
-
Rezgui, A.1
Ouzzani, M.2
Bouguettaya, A.3
Medjahed, B.4
-
33
-
-
0030370740
-
A sound type system for secure flow analysis
-
Volpano, D., Smith, G., & Irvine, C. (1996). A sound type system for secure flow analysis. Journal of Computer Security 4(3), 167-187.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 167-187
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
-
34
-
-
0003551095
-
-
World Wide Web Consortium (W3C). Retrieved September 19, 2005
-
W3C. (2000). Extensible markup language (XML). World Wide Web Consortium (W3C). Retrieved September 19, 2005, from http://www.w3c.org/TR/REC-xml
-
(2000)
Extensible Markup Language (XML)
-
-
-
35
-
-
0003607366
-
-
World Wide Web Consortium (W3C). Retrieved September 19, 2005
-
W3C. (2001). XML path language (XPath) 2.0. World Wide Web Consortium (W3C). Retrieved September 19, 2005, from http://www.w3.org/TR/xpath20
-
(2001)
XML Path Language (XPath) 2.0
-
-
-
36
-
-
1142264879
-
-
World Wide Web Consortium (W3C). Retrieved September 19, 2005
-
W3C. (2002a). XML encryption syntax and processing. World Wide Web Consortium (W3C). Retrieved September 19, 2005, from http://www.w3.org/TR/ xmlenc-core/
-
(2002)
XML Encryption Syntax and Processing
-
-
-
37
-
-
0043026142
-
-
World Wide Web Consortium (W3C). Retrieved September 19, 2005
-
W3C. (2002b). XML signature syntax and processing. World Wide Web Consortium (W3C). Retrieved September 19, 2005, from http://www.w3.org/TR/ xmldsig-core/
-
(2002)
XML Signature Syntax and Processing
-
-
-
38
-
-
1442288979
-
-
World Wide Web Consortium (W3C). Retrieved September 19, 2005
-
W3C. (2002c). XSL transformations (XSLT) version 2.0. World Wide Web Consortium (W3C). Retrieved September 19, 2005, from http://www.w3.org/TR/2002/ WD-xslt20-20020430
-
(2002)
XSL Transformations (XSLT) Version 2.0
-
-
|