-
1
-
-
85134887303
-
Specifying and enforcing access control policies for XML document sources
-
E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Specifying and enforcing access control policies for XML document sources. World Wide Web Journal, 3(3):139-151, 2000.
-
(2000)
World Wide Web Journal
, vol.3
, Issue.3
, pp. 139-151
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
2
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM TISSEC, 5(3):290-331, 2002.
-
(2002)
ACM TISSEC
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
5
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
E. Damiani, S. di Vimercati, S. Paraboschi, and P. Samarati. Design and implementation of an access control processor for XML documents. Computer Networks, 33(1-6):59-75, 2000.
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. di Vimercati, S. Paraboschi, and P. Samarati. A fine-grained access control system for XML documents. ACM TISSEC, 5(2):169-202, 2002.
-
(2002)
ACM TISSEC
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
7
-
-
0035509987
-
Controlling access to XML documents
-
E. Damiani, P. Samarati, S. di Vimercati, and S. Paraboschi. Controlling access to XML documents. IEEE Internet Computing, 5(6):18-28, 2001.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.6
, pp. 18-28
-
-
Damiani, E.1
Samarati, P.2
Di Vimercati, S.3
Paraboschi, S.4
-
8
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM TISSEC, 4(3):224-275, 2001.
-
(2001)
ACM TISSEC
, vol.4
, Issue.3
, pp. 224-275
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
10
-
-
84957022019
-
RBAC for XML document stores
-
Springer-Verlag, LNCS 2229
-
M. Hitchens and V. Varadharajan. RBAC for XML document stores. In ICICS 2001, pages 131-143. Springer-Verlag, LNCS 2229, 2001.
-
(2001)
ICICS 2001
, pp. 131-143
-
-
Hitchens, M.1
Varadharajan, V.2
-
13
-
-
0242655845
-
-
PhD thesis, Department of Computer Science, The University of Western Ontario, London, Canada, Sept.
-
M. Nyanchama. Commercial Integrity, Roles and Object Orientation. PhD thesis, Department of Computer Science, The University of Western Ontario, London, Canada, Sept. 1994.
-
(1994)
Commercial Integrity, Roles and Object Orientation
-
-
Nyanchama, M.1
-
14
-
-
0001940210
-
The role graph model and conflict of interest
-
M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(l):3-33, 1999.
-
(1999)
ACM TISSEC
, vol.2
, Issue.50
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.L.2
-
16
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Information and System Security, 3(2):l-23, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.2
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
17
-
-
0026119329
-
A model of authorization for next-generation database systems
-
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Trans Database Syst, 16(1):88-131, 1991.
-
(1991)
ACM Trans Database Syst
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
18
-
-
4143131108
-
A model of authorization for object-oriented and semantic databases
-
Venice, Italy, Mar.
-
F. Rabitti, D. Woelk, and W. Kim. A model of authorization for object-oriented and semantic databases. In Proceedings of the International Conference on Extending Database Technology, Venice, Italy, Mar. 1988.
-
(1988)
Proceedings of the International Conference on Extending Database Technology
-
-
Rabitti, F.1
Woelk, D.2
Kim, W.3
-
19
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Feb.
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans. on Information and Systems Security, 2(1):105-135, Feb. 1999.
-
(1999)
ACM Trans. on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
20
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29:38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
4143143196
-
W3c. XML path language (XPath) 2.0
-
Technical report, Nov.
-
w3c. XML path language (XPath) 2.0, W3C working draft 15. Technical report, http://www.w3.org/TR/xpath20, Nov. 2002.
-
(2002)
W3C Working Draft
, vol.15
-
-
|