-
1
-
-
0026204067
-
Datalog extensions for database queries and updates
-
Aug
-
S. Abiteboul and V. Vianu. Datalog extensions for database queries and updates. Journal of Computer and System Sciences, 43(1):62-124, Aug. 1991.
-
(1991)
Journal of Computer and System Sciences
, vol.43
, Issue.1
, pp. 62-124
-
-
Abiteboul, S.1
Vianu, V.2
-
2
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
Tokyo, Japan, Apr
-
R. Agrawal, P. Bird, T. Grandison, J. Kicrnan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In ICDE 05, Tokyo, Japan, Apr. 2005.
-
(2005)
ICDE 05
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kicrnan, J.4
Logan, S.5
Rjaibi, W.6
-
3
-
-
0242674432
-
Hippocratic databases
-
Hong Kong, China, Aug
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In VLDB 02, Hong Kong, China, Aug. 2002.
-
(2002)
VLDB 02
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
4
-
-
70349282755
-
A history-dependent access control mechanism using reflection
-
Lisbon, Portugal, Jun
-
M. Ancona, W. Cazzola, and E. B. Fernandez. A history-dependent access control mechanism using reflection. In MOS 99, Lisbon, Portugal, Jun. 1999.
-
(1999)
MOS 99
-
-
Ancona, M.1
Cazzola, W.2
Fernandez, E.B.3
-
5
-
-
84976736962
-
-
F. Bancilhon and R. R,ama,krishnan. An amateur's introduction to recursive query processing strategics. In SIGMOD 86, Washington, DC, May 1986.
-
F. Bancilhon and R. R,ama,krishnan. An amateur's introduction to recursive query processing strategics. In SIGMOD 86, Washington, DC, May 1986.
-
-
-
-
6
-
-
39049153474
-
Using attribute-based access control to enable attribute-based messaging
-
Miami Beach, FL, Dec
-
R. Bobba, O. Fatcmich, F. Khan, C. A. Guntcr, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC 06, Miami Beach, FL, Dec. 2006.
-
(2006)
ACSAC 06
-
-
Bobba, R.1
Fatcmich, O.2
Khan, F.3
Guntcr, C.A.4
Khurana, H.5
-
7
-
-
70349291845
-
Transaction datalog: A compositional language for transaction programming
-
A. J. Bonner, Transaction datalog: A compositional language for transaction programming. Lecture Notes in Computer Science, 1369:373-395, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1369
, pp. 373-395
-
-
Bonner, A.J.1
-
8
-
-
0032676577
-
Workflow, transactions, and datalog
-
Philadelphia, PA, Jun
-
A. J. Bonner. Workflow, transactions, and datalog. In PODS 99, Philadelphia, PA, Jun. 1999.
-
(1999)
PODS 99
-
-
Bonner, A.J.1
-
10
-
-
34548810781
-
Fine grained authorization through predicated grants
-
Istanbul, Turkey, Apr
-
S. Chaudhuri, T. Dutta, and S. Sudarshan. Fine grained authorization through predicated grants. In ICDE 07, Istanbul, Turkey, Apr. 2007.
-
(2007)
ICDE 07
-
-
Chaudhuri, S.1
Dutta, T.2
Sudarshan, S.3
-
11
-
-
67650303573
-
Rule based database security system and method
-
United States Patent 6,820,082, Nov
-
W. R. Cook and M. R. Gannholm. Rule based database security system and method. United States Patent 6,820,082, Nov. 2004.
-
(2004)
-
-
Cook, W.R.1
Gannholm, M.R.2
-
12
-
-
34548026791
-
A posteriori compliance control
-
Sophia Antipolis, France, Jun
-
S. Etalle and W. H. Winsborough. A posteriori compliance control. In SACMAT 07, Sophia Antipolis, France, Jun. 2007.
-
(2007)
SACMAT 07
-
-
Etalle, S.1
Winsborough, W.H.2
-
13
-
-
0021444827
-
Logic and databases: A deductive approach
-
Jun
-
H. Gallaire, J. Minker, and J.-M. Nicolas. Logic and databases: A deductive approach. ACM Computing Surveys, 16(2):153-185, Jun. 1984.
-
(1984)
ACM Computing Surveys
, vol.16
, Issue.2
, pp. 153-185
-
-
Gallaire, H.1
Minker, J.2
Nicolas, J.-M.3
-
14
-
-
0036994798
-
Instance-level access control for business-to-business electronic commerce
-
R. Goodwin, S. Goh, and F. Y. Wu. Instance-level access control for business-to-business electronic commerce. IBM Systems Journal, 41(2):303-321, 2002.
-
(2002)
IBM Systems Journal
, vol.41
, Issue.2
, pp. 303-321
-
-
Goodwin, R.1
Goh, S.2
Wu, F.Y.3
-
15
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Sep
-
P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. In TODS, l(3):242-255, Sep. 1976.
-
(1976)
TODS
, vol.50
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
16
-
-
0034428960
-
Policy-directed certificate retrieval
-
C. A. Gunter and T. Jim. Policy-directed certificate retrieval. Software- Practice and Experience, 30(15): 1609-1640, 2000.
-
(2000)
Software- Practice and Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
18
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
19
-
-
79952369664
-
Towards formal verification of role-based access control policies
-
under review, Submitted
-
S. Jha, N. Li, M. V. Tripunitara, Q. Wang, and W. H. Winsborough. Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing (TDSC). Submitted, under review.
-
IEEE Transactions on Dependable and Secure Computing (TDSC)
-
-
Jha, S.1
Li, N.2
Tripunitara, M.V.3
Wang, Q.4
Winsborough, W.H.5
-
20
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
Oakland, CA, May
-
T. Jim. SD3: A trust management system with certified evaluation. In IEEE Security and Privacy, Oakland, CA, May 2001.
-
(2001)
IEEE Security and Privacy
-
-
Jim, T.1
-
21
-
-
34250649785
-
Redundancy and information leakage in fine-grained access control
-
Chicago, IL, Jun
-
G. Kabra, R. Ramamurthy, and S. Sudarshan. Redundancy and information leakage in fine-grained access control. In SIGMOD 06, Chicago, IL, Jun. 2006.
-
(2006)
SIGMOD 06
-
-
Kabra, G.1
Ramamurthy, R.2
Sudarshan, S.3
-
23
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
Toronto, ON, Aug
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. J. DeWitt. Limiting disclosure in hippocratic databases. In VLDB 04, Toronto, ON, Aug. 2004.
-
(2004)
VLDB 04
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
24
-
-
27544510789
-
On safety in discretionary access control
-
Oakland, CA, May
-
N. Li and M. V. Tripunitara. On safety in discretionary access control. In IEEE Security and Privacy, Oakland, CA, May 2005.
-
(2005)
IEEE Security and Privacy
-
-
Li, N.1
Tripunitara, M.V.2
-
25
-
-
85027181850
-
Concepts and experiments in computational reflection
-
Orlando, FL, Oct
-
P. Maes. Concepts and experiments in computational reflection. In OOPSLA 87, Orlando, FL, Oct. 1987.
-
(1987)
OOPSLA 87
-
-
Maes, P.1
-
26
-
-
70349291844
-
Oracle Virtual Private Database
-
Oracle Corporation, Technical report, Oracle Corporation, Jun
-
Oracle Corporation. Oracle Virtual Private Database. Technical report, Oracle Corporation, Jun. 2005. http://www.oracle.com/technology/deploy/security/ db-security/virtual-private-database/index.html.
-
(2005)
-
-
-
27
-
-
70349276448
-
Oracle service request number 5973395.992. Technical support communication
-
Oracle Corporation, Jan
-
Oracle Corporation. Oracle service request number 5973395.992. Technical support communication, Jan. 2007.
-
(2007)
-
-
-
28
-
-
70349276447
-
Extending query rewriting techniques for fine-grained access control
-
Paris, France, Jun
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD 0J., Paris, France, Jun. 2004.
-
(2004)
SIGMOD 0J
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
29
-
-
70349293388
-
Extending SQL's grant and revoke operations, to limit and reactivate privileges
-
Schoorl, The Netherlands, Aug
-
A. Rosenthal and E. Sciore. Extending SQL's grant and revoke operations, to limit and reactivate privileges. In DBSec 00, Schoorl, The Netherlands, Aug. 2000.
-
(2000)
DBSec 00
-
-
Rosenthal, A.1
Sciore, E.2
-
31
-
-
0028541987
-
Modular stratification and magic sets for datalog programs with negation
-
Nov
-
K. A. Ross. Modular stratification and magic sets for datalog programs with negation. Journal of the A CM, 41(6):1216-1266, Nov. 1994.
-
(1994)
Journal of the A CM
, vol.41
, Issue.6
, pp. 1216-1266
-
-
Ross, K.A.1
-
32
-
-
3543115068
-
A layered design of discretionary access controls with decidable safety properties
-
Oakland, CA, May
-
J. A. Solworth and R. H. Sloan. A layered design of discretionary access controls with decidable safety properties. In IEEE Security and Privacy, Oakland, CA, May 2004.
-
(2004)
IEEE Security and Privacy
-
-
Solworth, J.A.1
Sloan, R.H.2
-
33
-
-
70349299590
-
-
Sybase, Inc. New security features in Sybase Adaptive Server Enterprise. Technical report, Sybase, Inc., 2003. http://www.Sybase.com/content/1013009/new- security-wp.pdf.
-
Sybase, Inc. New security features in Sybase Adaptive Server Enterprise. Technical report, Sybase, Inc., 2003. http://www.Sybase.com/content/1013009/new- security-wp.pdf.
-
-
-
-
34
-
-
0017013056
-
The semantics of predicate logic as a programming language
-
M. H. van Emden and R. A. Kowalski. The semantics of predicate logic as a programming language. Journal of the ACM, 23(4):733-742, 1976.
-
(1976)
Journal of the ACM
, vol.23
, Issue.4
, pp. 733-742
-
-
van Emden, M.H.1
Kowalski, R.A.2
-
35
-
-
33751029574
-
Policy-driven reflective enforcement of security policies
-
Dijon, France, Apr
-
I. Welch and F. Lu. Policy-driven reflective enforcement of security policies. In SAC 06, Dijon, France, Apr. 2006.
-
(2006)
SAC 06
-
-
Welch, I.1
Lu, F.2
|