메뉴 건너뛰기




Volumn , Issue , 2007, Pages 149-160

Trust management services in relational databases

Author keywords

Access control; Credentials; Relational DBMS; Trust

Indexed keywords

MATHEMATICAL MODELS; OPEN SYSTEMS; RELATIONAL DATABASE SYSTEMS;

EID: 34748852515     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1229285.1229308     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 4
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 6
    • 34748890804 scopus 로고    scopus 로고
    • Database language SQL - part 2: Foundation (SQL/foundation). ISO International Standard
    • Database language SQL - part 2: Foundation (SQL/foundation). ISO International Standard, ISO/IEC 9075:1999, 1999.
    • (1999) ISO/IEC , vol.9075 , pp. 1999
  • 10
    • 33745772562 scopus 로고    scopus 로고
    • Preventing attribute information leakage in automated trust negotiation
    • Alexandria, VA, USA, Nov
    • K. Irwin and T. Yu. Preventing attribute information leakage in automated trust negotiation. In Proc. of the 12th ACM CCS, Alexandria, VA, USA, Nov. 2005.
    • (2005) Proc. of the 12th ACM CCS
    • Irwin, K.1    Yu, T.2
  • 11
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • May
    • N. Li, J. Mitchell, and W. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 12
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 13
    • 33745764834 scopus 로고    scopus 로고
    • Automated trust negotiation using cryptographic credentials
    • Alexandria, VA, USA, Nov
    • J. Ni, N. Li, and W. Winsborough. Automated trust negotiation using cryptographic credentials. In Proc. of the 12th ACM CCS, Alexandria, VA, USA, Nov. 2005.
    • (2005) Proc. of the 12th ACM CCS
    • Ni, J.1    Li, N.2    Winsborough, W.3
  • 14
    • 84964853055 scopus 로고    scopus 로고
    • P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
    • P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
  • 18
    • 84954418287 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Oakland, CA, USA, May
    • T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003.
    • (2003) Proc. of the IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 19
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1):1-42, February 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.