메뉴 건너뛰기




Volumn , Issue , 2008, Pages 695-700

Dynamic purpose-based access control

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED PARAMETER NETWORKS; SECURITY SYSTEMS;

EID: 60649085774     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISPA.2008.80     Document Type: Conference Paper
Times cited : (25)

References (12)
  • 1
    • 28444446666 scopus 로고    scopus 로고
    • Extending relational database systems to automatically enforce privacy policies
    • R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In ICDE, pages 1013-1022, 2005.
    • (2005) ICDE , pp. 1013-1022
    • Agrawal, R.1    Bird, P.2    Grandison, T.3    Kiernan, J.4    Logan, S.5    Rjaibi, W.6
  • 3
    • 33750053325 scopus 로고    scopus 로고
    • Privacy-preserving database systems
    • E. Bertino, J.-W. Byun, and N. Li. Privacy-preserving database systems. In FOSAD, pages 178-206, 2005.
    • (2005) FOSAD , pp. 178-206
    • Bertino, E.1    Byun, J.-W.2    Li, N.3
  • 4
    • 45749089618 scopus 로고    scopus 로고
    • Purpose based access control for privacy protection in relational database systems
    • J.-W. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. VLDB J., 17(4):603-619, 2008.
    • (2008) VLDB J , vol.17 , Issue.4 , pp. 603-619
    • Byun, J.-W.1    Li, N.2
  • 6
    • 60649107731 scopus 로고    scopus 로고
    • O. for Economic Co-operation and Development. OECD guidelines on the protection of privacy and transborder flows of personal data of 1980.
    • O. for Economic Co-operation and Development. OECD guidelines on the protection of privacy and transborder flows of personal data of 1980.
  • 7
    • 34548016110 scopus 로고    scopus 로고
    • Privacy-aware role based access control
    • Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In SACMAT, pages 41-50, 2007.
    • (2007) SACMAT , pp. 41-50
    • Ni, Q.1    Trombetta, A.2    Bertino, E.3    Lobo, J.4
  • 9
    • 26444432535 scopus 로고    scopus 로고
    • Database privacy: Balancing confidentiality, integrity and availability
    • M. Olivier. Database privacy: Balancing confidentiality, integrity and availability. IGKDD Explorations Newsletter, 4(2):20-27, 2002.
    • (2002) IGKDD Explorations Newsletter , vol.4 , Issue.2 , pp. 20-27
    • Olivier, M.1
  • 10
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • S. Rizvi, A. O. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD Conference, pages 551-562, 2004.
    • (2004) SIGMOD Conference , pp. 551-562
    • Rizvi, S.1    Mendelzon, A.O.2    Sudarshan, S.3    Roy, P.4
  • 12
    • 46749089048 scopus 로고    scopus 로고
    • A purpose-based access control model
    • N. Yang, H. Barringer, and N. Zhang. A purpose-based access control model. In IAS, pages 143-148, 2007.
    • (2007) IAS , pp. 143-148
    • Yang, N.1    Barringer, H.2    Zhang, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.