-
1
-
-
84858937038
-
W3C recommendation
-
February
-
D. Beckett. W3C recommendation, RDF/XML syntax specification. http://www.w3.org/TR/rdf-syntax-grammar/, February 2004.
-
(2004)
RDF/XML Syntax Specification
-
-
Beckett, D.1
-
2
-
-
85134887303
-
Specifying and enforcing access control policies for XML document sources
-
May
-
E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Specifying and enforcing access control policies for XML document sources. World Wide Web, 3(3):139-151, May 2000.
-
(2000)
World Wide Web
, vol.3
, Issue.3
, pp. 139-151
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
3
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosure
-
November
-
A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosure. IEEE Trans. Knowledge and Data Eng., November, 2000.
-
(2000)
IEEE Trans. Knowledge and Data Eng.
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
5
-
-
0003587590
-
-
World Wide Web Consortium, w3c recommendation edition, November Accessed 27-Jun-2001
-
J. Clark and S. DeRose. XML Path Language (XPath) Version 1.0. World Wide Web Consortium, w3c recommendation edition, November 1999. http://www.w3.org/ TR/xpath. Accessed 27-Jun-2001.
-
(1999)
XML Path Language (XPath) Version 1.0
-
-
Clark, J.1
DeRose, S.2
-
6
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security TISSEC, 5(2):139-151, 2002.
-
(2002)
ACM Transactions on Information and System Security TISSEC
, vol.5
, Issue.2
, pp. 139-151
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
7
-
-
84891376611
-
Specification and enforcement of classification and inference constraints
-
May 9-12
-
S. Dawson, S. C. di Vimercati, and P. Samarati. Specification and enforcement of classification and inference constraints. In Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA, May 9-12 1999.
-
(1999)
Proc. of the 20th IEEE Symposium on Security and Privacy, Oakland, CA
-
-
Dawson, S.1
Di Vimercati, S.C.2
Samarati, P.3
-
11
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(4):216-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.4
, pp. 216-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.4
-
12
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
ACM Press
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proceedings of the 1997 ACM SIGMOD international conference on Management of data, pages 474-485. ACM Press, 1997.
-
(1997)
Proceedings of the 1997 ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
13
-
-
77954333557
-
Policy-based dissination of partial web-ontologies
-
New York, NY, USA
-
S. Kaushik, D. Wijesekera, and P. Ammann. Policy-based dissination of partial web-ontologies. In SWS '05: Proceedings of the 2005 workshop on Secure web services, pages 43-52, New York, NY, USA, 2005. ACM Press.
-
(2005)
SWS '05: Proceedings of the 2005 Workshop on Secure Web Services
, pp. 43-52
-
-
Kaushik, S.1
Wijesekera, D.2
Ammann, P.3
-
17
-
-
84949777168
-
Enhancing the controlled disclosure of sensitive information
-
Springer-Verlag Lecture Notes in Computer Science
-
D. Marks, A. Motro, and S. Jajodia. Enhancing the controlled disclosure of sensitive information. In Proc. European Symp. on Research in Computer Security, Springer-Verlag Lecture Notes in Computer Science, Vol. 1146, pages 290-303, 1996.
-
(1996)
Proc. European Symp. on Research in Computer Security
, vol.1146
, pp. 290-303
-
-
Marks, D.1
Motro, A.2
Jajodia, S.3
-
19
-
-
33746621471
-
Policy based access control for a RDF store
-
A WWW 2005 Workshop. W3C, May
-
P. Reddivari, T. Finin, and A. Joshi. Policy based Access Control for a RDF Store. In Proceedings of the Policy Management for the Web Workshop, A WWW 2005 Workshop, pages 78-83. W3C, May 2005.
-
(2005)
Proceedings of the Policy Management for the Web Workshop
, pp. 78-83
-
-
Reddivari, P.1
Finin, T.2
Joshi, A.3
-
20
-
-
0031185890
-
Information flow control in object-oriented systems
-
P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia. Information flow control in object-oriented systems. IEEE Trans. Knowl. Data Eng., 9(4):524-538, 1997.
-
(1997)
IEEE Trans. Knowl. Data Eng.
, vol.9
, Issue.4
, pp. 524-538
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
21
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. J. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.4
-
22
-
-
84858944254
-
-
Semagix Inc.
-
A. Sheth. Semagix Inc. http://www.semagix.com.
-
-
-
Sheth, A.1
-
23
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
June
-
P. Stachour and B. Thuraisingham. Design of LDV: A multilevel secure relational database management system. IEEE Trans. Knowledge and Data Eng., 2(2):190-209, June 1990.
-
(1990)
IEEE Trans. Knowledge and Data Eng.
, vol.2
, Issue.2
, pp. 190-209
-
-
Stachour, P.1
Thuraisingham, B.2
|