-
1
-
-
39749140948
-
Towards Traceability across Sovereign, Distributed RFID Databases
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Agrawal, R., Cheung, A., Kailing, K., Schönauer, S.: Towards Traceability across Sovereign, Distributed RFID Databases. In: IDEAS 2006: Proceedings of the 10th International Database Engineering and Applications Symposium, Washington, DC, USA, pp. 174-184. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
IDEAS 2006: Proceedings of the 10th International Database Engineering and Applications Symposium
, pp. 174-184
-
-
Agrawal, R.1
Cheung, A.2
Kailing, K.3
Schönauer, S.4
-
3
-
-
0033645572
-
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. In: RBAC 2000: Proceedings of the fifth ACM workshop on Role-based access control, pp. 21-30. ACM Press, New York (2000)
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. In: RBAC 2000: Proceedings of the fifth ACM workshop on Role-based access control, pp. 21-30. ACM Press, New York (2000)
-
-
-
-
4
-
-
33745625094
-
Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP's Auto-ID Infrastructure
-
Bornh"ovd, C., Lin, T., Haller, S., Schaper, J.: Integrating Automatic Data Acquisition with Business Processes - Experiences with SAP's Auto-ID Infrastructure. In: Proceedings of the 30th International Conference on Very Large Data Bases, pp. 1182-1188 (2004)
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
, pp. 1182-1188
-
-
Bornh"ovd, C.1
Lin, T.2
Haller, S.3
Schaper, J.4
-
5
-
-
84868135450
-
The Virtual Private Database in Oracle9iR2
-
CA 94065, U.S.A January
-
Browder, K., Davidson, M.A.: The Virtual Private Database in Oracle9iR2. In: Oracle Technical White Paper, Oracle Corporation, 500 Oracle Parkway, Redwood Shores, CA 94065, U.S.A (January 2002)
-
(2002)
Oracle Technical White Paper, Oracle Corporation, 500 Oracle Parkway, Redwood Shores
-
-
Browder, K.1
Davidson, M.A.2
-
7
-
-
82155199882
-
-
Do, H.-H., Anke, J., Hackenbroich, G.: Architecture Evaluation for Distributed Auto-ID Systems. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, 4080, pp. 30-34. Springer. Heidelberg (2006)
-
Do, H.-H., Anke, J., Hackenbroich, G.: Architecture Evaluation for Distributed Auto-ID Systems. In: Bressan, S., Küng, J., Wagner, R. (eds.) DEXA 2006. LNCS, vol. 4080, pp. 30-34. Springer. Heidelberg (2006)
-
-
-
-
8
-
-
41549156182
-
-
EPCglobal Inc. EPC Information Services (EPCIS) Version 1.0 Specification (April 2007), http ://www.epcglobalinc.org/standards/ EPCglobal_EPCIS_Ratified_Standard_12April_2007_V1.0.pdf
-
EPCglobal Inc. EPC Information Services (EPCIS) Version 1.0 Specification (April 2007), http ://www.epcglobalinc.org/standards/ EPCglobal_EPCIS_Ratified_Standard_12April_2007_V1.0.pdf
-
-
-
-
9
-
-
0002357382
-
Role-based access controls
-
Baltimore, MD, pp, October
-
Ferraiolo, D.F., Kuhn, D.R.: Role-based access controls. In: 15th National Computer Security Conference, Baltimore, MD, pp. 554-563 (October 1992)
-
(1992)
15th National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
10
-
-
34547691262
-
-
Floerkemeier, C., Lampe, M., Roduner, C.: Facilitating RFID Development with the Accada Prototyping Platform. In: Proceedings of PerWare Workshop 2007 at IEEE International Conference on Pervasive Computing and Communications, New York, USA (March 2007)
-
Floerkemeier, C., Lampe, M., Roduner, C.: Facilitating RFID Development with the Accada Prototyping Platform. In: Proceedings of PerWare Workshop 2007 at IEEE International Conference on Pervasive Computing and Communications, New York, USA (March 2007)
-
-
-
-
11
-
-
20844459862
-
RFID Privacy: An Overview of Problems and Proposed Solutions
-
Garfinkel, S., Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3), 34-43 (2005)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 34-43
-
-
Garfinkel, S.1
Juels, A.2
Pappu, R.3
-
12
-
-
34548168885
-
Context-Dependent Access Control for Contextual Information
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Groba, C., Groß, S., Springer, T.: Context-Dependent Access Control for Contextual Information. In: ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 155-161. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security
, pp. 155-161
-
-
Groba, C.1
Groß, S.2
Springer, T.3
-
14
-
-
41549154404
-
-
Grummt, E., Müller, M., Ackermann, R.: Access Control: Challenges and Approaches in the Internet of Things. In: Proceedings of the IADIS International Conference WWW/Internet 2007, Vila Real, Portugal, 2, pp. 89-93 (October 2007)
-
Grummt, E., Müller, M., Ackermann, R.: Access Control: Challenges and Approaches in the Internet of Things. In: Proceedings of the IADIS International Conference WWW/Internet 2007, Vila Real, Portugal, vol. 2, pp. 89-93 (October 2007)
-
-
-
-
15
-
-
41549107339
-
Ferraiolo, and D. Rick Kuhn. Assessment of Access Control Systems. Interagency
-
Gaithersburg, September
-
Vincent, C., Hu. D.F.: Ferraiolo, and D. Rick Kuhn. Assessment of Access Control Systems. Interagency Report 7316, National Institute of Standards and Technology, Gaithersburg, MD 20899-8930 (September 2006)
-
(2006)
National Institute of Standards and Technology
, vol.MD 20899-8930
-
-
Vincent, C.1
Hu, D.F.2
-
16
-
-
30744448197
-
Context sensitive access control
-
ACM Press, New York
-
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 111-119. ACM Press, New York (2005)
-
(2005)
SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
-
19
-
-
85102591607
-
Limiting Disclosure in Hippocratic Databases
-
Toronto, Canada, pp, August
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Limiting Disclosure in Hippocratic Databases. In: Proceedings of the 30th International Conference on Very Large Data Bases, Toronto, Canada, pp. 108-119 (August 2004)
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
20
-
-
3543052334
-
First Experiences Using XACML for Access Control in Distributed Systems
-
ACM Press, New York
-
Lorch, M., Proctor, S., Lepro, R., Kafura, D., Shah, S.: First Experiences Using XACML for Access Control in Distributed Systems. In: XMLSEC 2003: Proceedings of the 2003 ACM workshop on XML security, pp. 25-37. ACM Press, New York (2003)
-
(2003)
XMLSEC 2003: Proceedings of the 2003 ACM workshop on XML security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
21
-
-
33750291916
-
-
Peris-Lopez, P.. Hernandez-Castro. J.C. Estevez-Tapiador, J., Ribagorda, A.: R.FID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, 4217, pp. 159-170. Springer, Heidelberg (2006)
-
Peris-Lopez, P.. Hernandez-Castro. J.C. Estevez-Tapiador, J., Ribagorda, A.: R.FID Systems: A Survey on Security Threats and Proposed Solutions. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 159-170. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63, 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
23
-
-
85008011696
-
Integrating RFID
-
Sarma, S.: Integrating RFID. ACM Queue 2, 50-57 (2004)
-
(2004)
ACM Queue
, vol.2
, pp. 50-57
-
-
Sarma, S.1
-
24
-
-
84914732721
-
Access control in a relational data base management system by query modification
-
ACM Press, New York
-
Stonebraker, M., Wong, E.: Access control in a relational data base management system by query modification. In: ACM 1974: Proceedings of the 1974 annual conference, pp. 180-186. ACM Press, New York (1974)
-
(1974)
ACM 1974: Proceedings of the 1974 annual conference
, pp. 180-186
-
-
Stonebraker, M.1
Wong, E.2
-
26
-
-
41549094271
-
-
Tim Moses (Editor, extensible Access Control Markup Language (XACML) Version 2.0 February 2005
-
Tim Moses (Editor), extensible Access Control Markup Language (XACML) Version 2.0 (February 2005),
-
-
-
-
27
-
-
41549086739
-
-
http://docs.oasis-open.org/xacml/2.0/access.control-xacml-2. 0-corespec-os.pdf
-
-
-
-
28
-
-
41549116552
-
-
Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.: The EPCglobal Architecture Framework - EPCglobal Final Version of 1 July 2005 (July 2005), http ://www.epcglobalinc.org/standards/Final-epcglobal-arch- 20050701.pdf
-
Traub, K., Allgair, G., Barthel, H., Burstein, L., Garrett, J., Hogan, B., Rodrigues, B., Sarma, S., Schmidt, J., Schramek, C., Stewart, R., Suen, K.: The EPCglobal Architecture Framework - EPCglobal Final Version of 1 July 2005 (July 2005), http ://www.epcglobalinc.org/standards/Final-epcglobal-arch- 20050701.pdf
-
-
-
-
29
-
-
33745621088
-
Temporal Management of RFID data
-
VLDB Endowment, pp
-
Wang, F., Liu, P.: Temporal Management of RFID data, In: VLDB 2005: Proceedings of the 31st international conference on Very large data bases, VLDB Endowment, pp. 1128-1139 (2005)
-
(2005)
VLDB 2005: Proceedings of the 31st international conference on Very large data bases
, pp. 1128-1139
-
-
Wang, F.1
Liu, P.2
-
30
-
-
41549131002
-
Survey on XML-Based Policy Languages for Open Environments
-
Yagüe. M.L: Survey on XML-Based Policy Languages for Open Environments. Journal of Information Assurance and Security 1, 11-20 (2006)
-
(2006)
Journal of Information Assurance and Security
, vol.1
, pp. 11-20
-
-
Yagüe, M.L.1
|