-
1
-
-
0242674432
-
Hippocratic
-
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic. In: Proceedings of the 28th International Conference on Very Large Databases (VLDB) (2002)
-
(2002)
Proceedings of the 28th International Conference on Very Large Databases (VLDB)
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
2
-
-
24644450643
-
ANSI: American national standard for information technology-role based access control
-
ANSI: American national standard for information technology-role based access control. ANSI INCITS 359-2004 (2004)
-
(2004)
ANSI INCITS 359-2004
-
-
-
3
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
Ashley, P., Powers, C.S., Schunter, M.: Privacy promises, access control, and privacy management. In: Third International Symposium on Electronic Commerce (2002)
-
(2002)
Third International Symposium on Electronic Commerce
-
-
Ashley, P.1
Powers, C.S.2
Schunter, M.3
-
4
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
4
-
Barker S., Stuckey P.J. (2003). Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secu. 6(4):501-546
-
(2003)
ACM Trans. Inf. Syst. Secu.
, vol.6
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
6
-
-
0029407462
-
Database security: Research and practice
-
7
-
Bertino E., Jajodia S., Samarati P. (1995). Database security: research and practice. Inf. Syst. 20(7):537-556
-
(1995)
Inf. Syst.
, vol.20
, pp. 537-556
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
9
-
-
0005479271
-
The seaview security model
-
Denning, D., Lunt, T., Schell, R., Shockley, W., Heckman, M.: The seaview security model. In: The IEEE Symposium on Research in Security and Privacy (1988)
-
(1988)
The IEEE Symposium on Research in Security and Privacy
-
-
Denning, D.1
Lunt, T.2
Schell, R.3
Shockley, W.4
Heckman, M.5
-
10
-
-
29844452555
-
Reference reconciliation in complex information spaces
-
Dong, X., Halevy, A., Madhavan, J., Nemes, E.: Reference reconciliation in complex information spaces. In: ACM International Conference on Management of Data (SIGMOD) (2005)
-
(2005)
ACM International Conference on Management of Data (SIGMOD)
-
-
Dong, X.1
Halevy, A.2
Madhavan, J.3
Nemes, E.4
-
11
-
-
45749125298
-
-
Federal Trade Commision: Children's online privacy protection act of 1998
-
Federal Trade Commision: Children's online privacy protection act of 1998. Available at www.cdt.org/legislation/105th/privacy/ coppa.html
-
-
-
-
15
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
3
-
Ferraiolo D.F., Sandhu R.S., Gavrila S., Kuhn D.R., Chandramouli R. (2001). Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Sec. 4(3):224-274
-
(2001)
ACM Trans. Inf. Syst. Sec.
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
20
-
-
0347164897
-
Personalized hypermedia and international privacy
-
5
-
Kobsa A. (2002). Personalized hypermedia and international privacy. Communic ACM. 45(5):64-67
-
(2002)
Communic ACM.
, vol.45
, pp. 64-67
-
-
Kobsa, A.1
-
22
-
-
85102591607
-
Disclosure in hippocratic databases
-
LeFevre, K., Agrawal, R., Ercegovac, V., Ramakrishnan, R., Xu, Y., DeWitt, D.: Disclosure in hippocratic databases. In: The 30th International Conference on Very Large Databases (VLDB) (2004)
-
(2004)
The 30th International Conference on Very Large Databases (VLDB)
-
-
Lefevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
Dewitt, D.6
-
24
-
-
45749106784
-
-
Oracle Corporation December
-
Oracle Corporation: The Oracle Database SQL References, December 2003. Availabe at www.oracle.com.
-
(2003)
The Oracle Database SQL References
-
-
-
26
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for role-based access control: towards a unified standard. In: Proceedings of the Fifth ACM Workshop on Role-Based Access Control (RBAC 2000), pp. 47-63 (2000)
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-Based Access Control (RBAC 2000)
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
|