-
1
-
-
80052057722
-
A uniform indexing scheme for geo-spatial data and authorizations
-
Kluwer Academic Publ, Boston, MA
-
ATLURI, V. AND MAZZOLENI, P. 2002. A uniform indexing scheme for geo-spatial data and authorizations. In Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security, Kluwer Academic Publ, Boston, MA. 207-218.
-
(2002)
Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security
, pp. 207-218
-
-
ATLURI, V.1
MAZZOLENI, P.2
-
2
-
-
19544365072
-
An authorization model for geographical maps
-
ACM Press, New York
-
BELUSSI, A., BERTINO, E., CATANIA, B., DAMIANI, M., AND NUCITA, A. 2004. An authorization model for geographical maps. In Proceedings of the 12th Annual ACM International Workshop on Geographic Information Systems. ACM Press, New York. 82-91.
-
(2004)
Proceedings of the 12th Annual ACM International Workshop on Geographic Information Systems
, pp. 82-91
-
-
BELUSSI, A.1
BERTINO, E.2
CATANIA, B.3
DAMIANI, M.4
NUCITA, A.5
-
3
-
-
2442558027
-
An access-control system for a web map management service
-
IEEE Computer Society, Washington, D.C
-
BERTINO, E., DAMIANI, M., AND MOMINI, D. 2004. An access-control system for a web map management service. In Proceedings of the 14th International Workshop on Research Issues on Data Engineering (RIDE'04). IEEE Computer Society, Washington, D.C. 33-39.
-
(2004)
Proceedings of the 14th International Workshop on Research Issues on Data Engineering (RIDE'04)
, pp. 33-39
-
-
BERTINO, E.1
DAMIANI, M.2
MOMINI, D.3
-
4
-
-
23244445557
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access-control
-
May
-
BHATTI, R., GHAFOOR, A., BERTINO, E., AND JOSHI, J. 2005. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access-control. ACM Transactions on Information and System Security (TISSEC) 8, 2 (May), 187-227.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 187-227
-
-
BHATTI, R.1
GHAFOOR, A.2
BERTINO, E.3
JOSHI, J.4
-
7
-
-
85006599841
-
A small set of formal topological relationships suitable for end-user interaction
-
Proceedings of the 3rd International Symposium on Advances in Spatial Databases, Springer-Verlag, New York
-
CLEMENTINI, E., FELICE, P. D., AND VAN OOSTEROM, P. 1993. A small set of formal topological relationships suitable for end-user interaction. In Proceedings of the 3rd International Symposium on Advances in Spatial Databases. Lecture Notes in Computer Science, vol. 692. Springer-Verlag, New York. 277-295.
-
(1993)
Lecture Notes in Computer Science
, vol.692
, pp. 277-295
-
-
CLEMENTINI, E.1
FELICE, P.D.2
VAN OOSTEROM, P.3
-
9
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM Press, New York
-
COVINGTON, M., LONG, W., SRINIVASAN, S., DEV, A., AHAMAD, M., AND ABOWD, G. 2001. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT01). ACM Press, New York. 10-20.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT01)
, pp. 10-20
-
-
COVINGTON, M.1
LONG, W.2
SRINIVASAN, S.3
DEV, A.4
AHAMAD, M.5
ABOWD, G.6
-
10
-
-
33751051730
-
-
DAMIANI, M. AND BERTINO, E. 2006. Access control and privacy in location-aware services for mobile organizations. In Proceedings of 7th Conference on Mobile Data Management (MDM'06). IEEE Computer Society, Washington, D.C. 11.
-
DAMIANI, M. AND BERTINO, E. 2006. Access control and privacy in location-aware services for mobile organizations. In Proceedings of 7th Conference on Mobile Data Management (MDM'06). IEEE Computer Society, Washington, D.C. 11.
-
-
-
-
11
-
-
84992227458
-
-
FERRAIOLO, D., SANDHU, R., GAVRILA, S., KUHN, D., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access-control. ACM Transactions on Information and System Security (TISSEC) 4, 3 (Aug.), 224-274.
-
FERRAIOLO, D., SANDHU, R., GAVRILA, S., KUHN, D., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access-control. ACM Transactions on Information and System Security (TISSEC) 4, 3 (Aug.), 224-274.
-
-
-
-
12
-
-
33646521763
-
Region-based query languages for spatial databases in the topological data model
-
Proceedings of the 8th International Symposium on Spatial and Temporal Databases SSTD'03, Springer-Verlag, New York
-
FORLIZZI, L., KUIJPERS, B., AND NARDELLI, E. 2003. Region-based query languages for spatial databases in the topological data model. In Proceedings of the 8th International Symposium on Spatial and Temporal Databases (SSTD'03). Lecture Notes in Computer Science, vol. 2750. Springer-Verlag, New York. 344-361.
-
(2003)
Lecture Notes in Computer Science
, vol.2750
, pp. 344-361
-
-
FORLIZZI, L.1
KUIJPERS, B.2
NARDELLI, E.3
-
13
-
-
4143096907
-
-
HANSEN, F. AND OLESHCHUK, V. 2003a. Spatial role-based access-control model for wireless networks. In Proceedings of the 58th IEEE Vehicular Technology Conference (VTC'03). 3. IEEE Computer Society, Washington, D.C. 2093-2097.
-
HANSEN, F. AND OLESHCHUK, V. 2003a. Spatial role-based access-control model for wireless networks. In Proceedings of the 58th IEEE Vehicular Technology Conference (VTC'03). Vol. 3. IEEE Computer Society, Washington, D.C. 2093-2097.
-
-
-
-
14
-
-
33847098151
-
-
HANSEN, F. AND OLESHCHUK, V. 2003b. SRBAC: a spatial role-based access-control model for mobile systems. In Proceedings of the 7th Nordic Workshop on Secure IT Systems (NORDSEC'03). Gj'vik, Norway, 129-141.
-
HANSEN, F. AND OLESHCHUK, V. 2003b. SRBAC: a spatial role-based access-control model for mobile systems. In Proceedings of the 7th Nordic Workshop on Secure IT Systems (NORDSEC'03). Gj'vik, Norway, 129-141.
-
-
-
-
15
-
-
17444406680
-
-
JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access-control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
-
JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access-control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
-
-
-
-
17
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
ACM Press, New York
-
KUHN, D. 1997. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC'97). ACM Press, New York. 23-30.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC'97)
, pp. 23-30
-
-
KUHN, D.1
-
19
-
-
30644467248
-
Declaration and enforcement of fine grained access restrictions for a service-based geospatial data infrastructure
-
ACM Press, New York
-
MATHEUS, A. 2005. Declaration and enforcement of fine grained access restrictions for a service-based geospatial data infrastructure. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05). ACM Press, New York. 21-28.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05)
, pp. 21-28
-
-
MATHEUS, A.1
-
20
-
-
33847156221
-
Open GIS simple features specification for SQL
-
OPEN GIS CONSORTIUM, 1.1
-
OPEN GIS CONSORTIUM. 1999. Open GIS simple features specification for SQL. Revision 1.1.
-
(1999)
Revision
-
-
-
23
-
-
30644478707
-
An access control model for geographic data in an XML-based framework
-
INSTICC Press, Porto, Portugal
-
PUREVJII, B., MAGASA, T. A., IMAI, S., AND KANAMORI, Y. 2004. An access control model for geographic data in an XML-based framework. In Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS'04). INSTICC Press, Porto, Portugal. 251-260.
-
(2004)
Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS'04)
, pp. 251-260
-
-
PUREVJII, B.1
MAGASA, T.A.2
IMAI, S.3
KANAMORI, Y.4
-
24
-
-
0030086382
-
Role-Based Access Control Models
-
SANDHU, R., COYNE, E., PEINSTEIN, H., AND YOUMAN, C. 1996. Role-Based Access Control Models. IEEE Computer 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.1
COYNE, E.2
PEINSTEIN, H.3
YOUMAN, C.4
-
25
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
ACM Press, New York
-
SANDHU, R., FERRAIOLO, D., AND KUHN, D. 2000. The NIST model for role-based access control: towards a unified standard. In Proceedings of the 6th ACM Workshop on Role-based Access Control (RBAC'00). ACM Press, New York. 47-63.
-
(2000)
Proceedings of the 6th ACM Workshop on Role-based Access Control (RBAC'00)
, pp. 47-63
-
-
SANDHU, R.1
FERRAIOLO, D.2
KUHN, D.3
-
26
-
-
4444270398
-
Conflict checking of separation of duty constraints in RBAC - implementation experiences
-
Innsbruck, Austria
-
STREMBECK, M. 2004. Conflict checking of separation of duty constraints in RBAC - implementation experiences. In Proceedings of the Conference on Software Engineering (SE'04), Innsbruck, Austria. 224-229.
-
(2004)
Proceedings of the Conference on Software Engineering (SE'04)
, pp. 224-229
-
-
STREMBECK, M.1
|