메뉴 건너뛰기




Volumn DISI, Issue , 2008, Pages 380-385

Succinct access control policies for published XML datasets

Author keywords

Access control; Parameterized roles; XML

Indexed keywords

ACCESS CONTROL POLICIES; CRYPTOGRAPHIC KEY; DATA SETS; ENCRYPTION OPERATIONS; PARAMETERIZED; PARAMETERIZED ROLES; PROTECTION REQUIREMENTS; RBAC MODEL; READ-ONLY ACCESS; ROLE-BASED ACCESS CONTROL MODEL; SECURE PUBLISHING; TIME COMPLEXITY;

EID: 55849135819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (2)

References (15)
  • 4
    • 0035748036 scopus 로고    scopus 로고
    • Devanbu, P., Gertz, M., Kwong, A., Martel, C, Nuckolls, G. and S.G. Stubblebine. Flexible Authentication of XML documents. In Proc. of the 8th ACM Conf. on Computer and Communications Security, ACM Press, (2001).
    • Devanbu, P., Gertz, M., Kwong, A., Martel, C, Nuckolls, G. and S.G. Stubblebine. Flexible Authentication of XML documents. In Proc. of the 8th ACM Conf. on Computer and Communications Security, ACM Press, (2001).
  • 7
    • 84859404584 scopus 로고    scopus 로고
    • A Design for Parameterized Roles
    • Ge, M. and Osborn., S.L. A Design for Parameterized Roles. DBSec (2004), 251-264.
    • (2004) DBSec , pp. 251-264
    • Ge, M.1    Osborn, S.L.2
  • 8
    • 85009120801 scopus 로고    scopus 로고
    • Controlling Access to Published Data Using Cryptography
    • Berlin, Germany
    • Miklau, G. and Suciu, D. Controlling Access to Published Data Using Cryptography, In Proc. of the 29th VLDB Conference, Berlin, Germany, (2003).
    • (2003) Proc. of the 29th VLDB Conference
    • Miklau, G.1    Suciu, D.2
  • 9
    • 84871789204 scopus 로고    scopus 로고
    • Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents
    • Montreal, Canada
    • Müldner, T., Leighton, G. and Miziołek, J.K. Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents. Extreme Markup Languages 2006, (2006), Montreal, Canada.
    • (2006) Extreme Markup Languages 2006
    • Müldner, T.1    Leighton, G.2    Miziołek, J.K.3
  • 10
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • Osborn, S., Sandhu, R., Munawer, Q. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans, on Information and System Security, 3:2, (2000), 85-106.
    • (2000) ACM Trans, on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 13
    • 77949546130 scopus 로고    scopus 로고
    • W3C XML Encryption http://w3.org/Encryption/2001.
    • W3C XML Encryption http://w3.org/Encryption/2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.