-
1
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
Bertino, E., Sandhu, R.: Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing 2 (2005) 2-19
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.2
-
2
-
-
0004190705
-
-
ACM Press
-
Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press (1995)
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
9
-
-
84957805078
-
Platform for enterprise privacy practices: Privacy-enabled management of customer data
-
Dingledine, R., Syverson, P., eds.: Privacy Enhancing Technologies. Springer-Verlag
-
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: Privacy-enabled management of customer data. In Dingledine, R., Syverson, P., eds.: Privacy Enhancing Technologies. Volume 2482 of Lecture Notes in Computer Science., Springer-Verlag (2003) 69-84
-
(2003)
Lecture Notes in Computer Science
, vol.2482
, pp. 69-84
-
-
Karjoth, G.1
Schunter, M.2
Waidner, M.3
-
11
-
-
0345829056
-
Provisions and obligations in policy rule management
-
Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Provisions and obligations in policy rule management. Journal of Network and Systems Management 11 (2003) 351-372
-
(2003)
Journal of Network and Systems Management
, vol.11
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
12
-
-
33746629172
-
Reasoning with advanced policy rules and its application to access control
-
Bettini, C., Jajodia, S., Wang, X.S., Wijesekera, D.: Reasoning with advanced policy rules and its application to access control. International Journal on Digital Libraries 4 (2004) 156-170
-
(2004)
International Journal on Digital Libraries
, vol.4
, pp. 156-170
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
13
-
-
33646071594
-
On obligations
-
de Capitani di Vimercati, S., Syverson, P., Gollmann, D., eds.: Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005). Springer-Verlag
-
Hilty, M., Basin, D., Pretschner, A.: On obligations. In de Capitani di Vimercati, S., Syverson, P., Gollmann, D., eds.: Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 2005). Volume 3679 of Lecture Notes in Computer Science., Springer-Verlag (2005) 98-117
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 98-117
-
-
Hilty, M.1
Basin, D.2
Pretschner, A.3
-
14
-
-
33746653154
-
Controlling access to documents: A formal access control model
-
Swiss Federal Institute of Technology Zurich
-
Sevinç, P.E., Basin, D.: Controlling access to documents: A formal access control model. Technical report, Swiss Federal Institute of Technology Zurich (2006)
-
(2006)
Technical Report
-
-
Sevinç, P.E.1
Basin, D.2
-
17
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security 5 (2002) 169-202
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
20
-
-
0035330891
-
Securing XML documents with Author-X
-
Bertino, E., Castano, S., Ferrari, E.: Securing XML documents with Author-X. IEEE Internet Computing 5 (2001) 21-31
-
(2001)
IEEE Internet Computing
, vol.5
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
21
-
-
4544357506
-
Access control for XML documents and data
-
Bertino, E., Carminati, B., Ferrari, E.: Access control for XML documents and data. Information Security Technical Report 9 (2004) 19-34
-
(2004)
Information Security Technical Report
, vol.9
, pp. 19-34
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
-
22
-
-
84945294315
-
An access control model for tree data structures
-
Gabillon, A., Munier, M., Bascou, J.J., Gallon, L., Bruno, E.: An access control model for tree data structures. In: Proceedings of the 5th International Conference on Information Security. (2002) 117-135
-
(2002)
Proceedings of the 5th International Conference on Information Security
, pp. 117-135
-
-
Gabillon, A.1
Munier, M.2
Bascou, J.J.3
Gallon, L.4
Bruno, E.5
|