메뉴 건너뛰기




Volumn 3178, Issue , 2004, Pages 148-162

Abstracting and refining authorization in SQL

Author keywords

Privilege Inference; SQL Authorization; Views

Indexed keywords

INFORMATION MANAGEMENT;

EID: 35048835357     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30073-1_11     Document Type: Article
Times cited : (3)

References (19)
  • 1
    • 35048865481 scopus 로고    scopus 로고
    • An extended authorization model for relational databases
    • E. Bertino, P. Samarati, S. Jajodia, "An extended authorization model for relational databases", IEEE TKDE, 1997
    • (1997) IEEE TKDE
    • Bertino, E.1    Samarati, P.2    Jajodia, S.3
  • 3
    • 1942532238 scopus 로고    scopus 로고
    • XML-Based Specification for Web Services Document Security
    • April
    • R. Bhatti, E. Bertino, A. Ghafoor, J. Joshi, "XML-Based Specification for Web Services Document Security", IEEE Computer, April 2004.
    • (2004) IEEE Computer
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.4
  • 5
    • 0031357551 scopus 로고    scopus 로고
    • Authorization Specification and Enforcement in Federated Database Systems
    • S. De Capitani di Vimercati, P. Samarati, "Authorization Specification and Enforcement in Federated Database Systems", Journal of Computer Security, vol. 5, n. 2, 1997, pp. 155-188.
    • (1997) Journal of Computer Security , vol.5 , Issue.2 , pp. 155-188
    • De Capitani Di Vimercati, S.1    Samarati, P.2
  • 9
    • 0018008817 scopus 로고
    • On an Authorization Mechanism
    • September
    • R. Fagin, "On an Authorization Mechanism", ACM Transactions on Database Systems, Vol. 3, No. 3, September 1978, Pages 310-319.
    • (1978) ACM Transactions on Database Systems , vol.3 , Issue.3 , pp. 310-319
    • Fagin, R.1
  • 10
    • 35048857975 scopus 로고    scopus 로고
    • Security Policies in Replicated and Autonomous Databases
    • S. Jajodia (ed), Kluwer
    • E Gudes and MS Olivier, "Security Policies in Replicated and Autonomous Databases," in S. Jajodia (ed), Database Security XII: Status and Prospects, 93-107, Kluwer, 1999
    • (1999) Database Security XII: Status and Prospects , pp. 93-107
    • Gudes, E.1    Olivier, M.S.2
  • 12
    • 35048868513 scopus 로고    scopus 로고
    • A Role for Research in the Database Industry
    • December
    • D. Lomet "A Role for Research in the Database Industry" ACM Computing Surveys 28(4es), December 1996.
    • (1996) ACM Computing Surveys , vol.28 , Issue.4
    • Lomet, D.1
  • 13
    • 35048861984 scopus 로고
    • Formal Semantics of SQL Queries
    • September
    • M. Negri, G. Pelagatti, L. Sbattella, "Formal Semantics of SQL Queries" ACM TODS 17(3), September 1991
    • (1991) ACM TODS , vol.17 , Issue.3
    • Negri, M.1    Pelagatti, G.2    Sbattella, L.3
  • 14
  • 15
    • 3142702944 scopus 로고    scopus 로고
    • Extending Query Rewriting Techniques for Fine-Grained Access Control
    • Paris
    • S. Rizvi, A. Mendelzon, S. Sudarshan, P. Roy "Extending Query Rewriting Techniques for Fine-Grained Access Control", ACM SIGMOD Conf., Paris, 2004.
    • (2004) ACM SIGMOD Conf.
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4
  • 16
    • 0038561120 scopus 로고    scopus 로고
    • First-Class Views: A Key to User-Centered Computing
    • Sept.
    • A. Rosenthal, E. Sciore, "First-Class Views: A Key to User-Centered Computing", SIGMOD Record, Sept. 1999.
    • (1999) SIGMOD Record
    • Rosenthal, A.1    Sciore, E.2
  • 19
    • 0035790651 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Chantilly VA
    • W. Yao, K. Moody, J. Bacon, "A model of OASIS role-based access control and its support for active security", ACM SACMAT Conf., Chantilly VA, 2001.
    • (2001) ACM SACMAT Conf.
    • Yao, W.1    Moody, K.2    Bacon, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.