-
1
-
-
70349123905
-
-
GeoXACML Implementation Specification
-
GeoXACML Implementation Specification, http://www.opengeospatial.org/ standards/geoxacml.
-
-
-
-
2
-
-
70349087906
-
-
Open GIS Consortium Interoperability Demonstration Focuses on Emergency Response Situations
-
Open GIS Consortium Interoperability Demonstration Focuses on Emergency Response Situations, http://xml.coverpages.org/ogc-wsinterop.html.
-
-
-
-
3
-
-
70349111984
-
-
The Open Geospatial Consortium OGC
-
The Open Geospatial Consortium (OGC). http://www.opengeospatial.org.
-
-
-
-
4
-
-
45949099539
-
-
XML Signature Syntax and Processing, June 2008, core
-
XML Signature Syntax and Processing, W3C Recommendation, June 2008. http://www.w3.org/TR/xmldsig-core/, 2008.
-
(2008)
W3C Recommendation
-
-
-
7
-
-
70349087072
-
-
OGC Critical Infrastructure Protection Initiative CIPI
-
OGC Critical Infrastructure Protection Initiative (CIPI), http://ip.opengis.org/cipi/, 2006.
-
(2006)
-
-
-
9
-
-
70349083088
-
-
OpenGIS Geography Language (GML) Encoding Specification, version 3.1.1, http://www.opengeospatial.org/standards/gml, 2007.
-
OpenGIS Geography Language (GML) Encoding Specification, version 3.1.1, http://www.opengeospatial.org/standards/gml, 2007.
-
-
-
-
11
-
-
77954338531
-
Reasoning with semantics-aware access control policies for geospatial Web services
-
Fairfax VA, USA
-
A. Alam, G. Subbiah, and B. Thuraisingham. Reasoning with semantics-aware access control policies for geospatial Web services. In A CM Workshop on Secure Web Services (SWS), George Mason University, Fairfax VA, USA, 2006.
-
(2006)
A CM Workshop on Secure Web Services (SWS), George Mason University
-
-
Alam, A.1
Subbiah, G.2
Thuraisingham, B.3
-
12
-
-
70349090262
-
Geography resource description framework (GRDF) and secure GRDF (S-GRDF)
-
Technical report, The University of Texas at Dallas
-
A. Alam and B. Thuraisingham. Geography resource description framework (GRDF) and secure GRDF (S-GRDF). Technical report, The University of Texas at Dallas, 2006.
-
(2006)
-
-
Alam, A.1
Thuraisingham, B.2
-
15
-
-
8344226326
-
Mapping the risks: Assessing the homeland security implications of publicly available geospatial information
-
Technical Report, RAND National Defense Research Institute
-
J. C. Baker, B. E. Lachman, D. R. Frelinger, K. M. O'Connell, and A. Hou. Mapping the risks: Assessing the homeland security implications of publicly available geospatial information. Technical Report, RAND National Defense Research Institute, 2004.
-
(2004)
-
-
Baker, J.C.1
Lachman, B.E.2
Frelinger, D.R.3
O'Connell, K.M.4
Hou, A.5
-
16
-
-
19544365072
-
An authorization model for geographical maps
-
A. Belussi, E. Bertino, B. Catania, M. L. Damiani, and A. Nucita. An authorization model for geographical maps. In 12th ACM International Workshop on Geographic Information Systems, (ACM-GIS), 2004.
-
(2004)
12th ACM International Workshop on Geographic Information Systems, (ACM-GIS)
-
-
Belussi, A.1
Bertino, E.2
Catania, B.3
Damiani, M.L.4
Nucita, A.5
-
18
-
-
0038447171
-
Design and comparison of lattices of topological relations for spatial representation and reasoning
-
F. L. Ber and A. Napoli. Design and comparison of lattices of topological relations for spatial representation and reasoning. Journal of Experimental & Theoretical Artificial Intelligence, 15(3):331-371, 2003.
-
(2003)
Journal of Experimental & Theoretical Artificial Intelligence
, vol.15
, Issue.3
, pp. 331-371
-
-
Ber, F.L.1
Napoli, A.2
-
19
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. A CM Transactions on Information and System Security, 4(3):191-233, 2001.
-
(2001)
A CM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
20
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. A CM Transactions on Information and System Security, 6(1):71-127, 2003.
-
(2003)
A CM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
23
-
-
0040884892
-
A flexible authorization mechanism for relational database systems
-
E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational database systems. A CM Transactions on Information Systems, 17(2):101-140, 1999.
-
(1999)
A CM Transactions on Information Systems
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
24
-
-
19944380112
-
Database security-concepts, approaches, and challenges
-
E. Bertino and R. S. Sandhu. Database security-concepts, approaches, and challenges. IEEE Transactions on Dependable and Secure Computing, 2(1):2-19, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 2-19
-
-
Bertino, E.1
Sandhu, R.S.2
-
25
-
-
23244445557
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
R. Bhatti, A. Ghafoor, E. Bertino, and J. Joshi. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System, Security, 8(2):187-227, 2005.
-
(2005)
ACM Transactions on Information and System, Security
, vol.8
, Issue.2
, pp. 187-227
-
-
Bhatti, R.1
Ghafoor, A.2
Bertino, E.3
Joshi, J.4
-
27
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. J. Covington, W. Long, S. Srinivasan, M. A. Anind K. Dey, and G. D. Abowd. Securing context-aware applications using environment roles. In 6th ACM Symposium on Access Control Models and Technologies, 2001.
-
(2001)
6th ACM Symposium on Access Control Models and Technologies
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Anind, M.A.4
Dey, K.5
Abowd, G.D.6
-
28
-
-
33847092871
-
Geo-RBAC: A spatially-aware RBAC
-
M. Damiani, E. Bertino, B. Catania, and P. Perlasca. Geo-RBAC: a spatially-aware RBAC. ACM Transactions on Information and System Security, 10(1):2, 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.1
, pp. 2
-
-
Damiani, M.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
29
-
-
27844601582
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, and S. Stubblebine. Flexible authentication of XML documents. Journal of Computer Security, 12(6):841-864, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.6
, pp. 841-864
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Stubblebine, S.5
-
30
-
-
0038274733
-
Authentic data publication over the Internet
-
P. Devanbu, M. Gertz, C. Martel, and S. Stubblebine. Authentic data publication over the Internet. Journal of Computer Security, 11(3):291-314, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 291-314
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
34
-
-
33845261802
-
A data and query model for streaming geospatial image data
-
Revised Selected Papers. LNCS 4254, Springer
-
M. Gertz, Q. Hart, C. Rueda, S. Singhal, and J. Zhang. A data and query model for streaming geospatial image data. In 11th International Workshop on Foundations of Models and Languages for Data and Objects (Query Languages and Query Processing-QLQP), Revised Selected Papers. LNCS 4254, Springer, 687-699. 2006.
-
(2006)
11th International Workshop on Foundations of Models and Languages for Data and Objects (Query Languages and Query Processing-QLQP)
, pp. 687-699
-
-
Gertz, M.1
Hart, Q.2
Rueda, C.3
Singhal, S.4
Zhang, J.5
-
35
-
-
33745244529
-
Databases that tell the truth: Authentic data publication
-
M. Gertz, A. Kwong, C. Martel, G. Nuckolls, P. Devanbu, and S. Stubblebine. Databases that tell the truth: Authentic data publication. Bulletin of the Technical Committee on Data Engineering, 7(1):21-41, 2004.
-
(2004)
Bulletin of the Technical Committee on Data Engineering
, vol.7
, Issue.1
, pp. 21-41
-
-
Gertz, M.1
Kwong, A.2
Martel, C.3
Nuckolls, G.4
Devanbu, P.5
Stubblebine, S.6
-
37
-
-
70349153190
-
Database Security
-
Bidgoli, H, editor, Wiley
-
M. Gertz and A. M. Rosenthal. Database Security. In Bidgoli, H. (editor) Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection and Management, pages 380-395, Wiley. 2006.
-
(2006)
Handbook of Information Security, Threats, Vulnerabilities, Prevention, Detection and Management
, pp. 380-395
-
-
Gertz, M.1
Rosenthal, A.M.2
-
39
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
41
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Transactions on Knowledge Data Eng, 17(1):4-23, 2005.
-
(2005)
IEEE Transactions on Knowledge Data Eng
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
44
-
-
3543052334
-
Access control: First experiences using XACML for access control in distributed systems
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah. Access control: First experiences using XACML for access control in distributed systems. In A CM workshop on XML security, 2003.
-
(2003)
A CM workshop on XML security
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
46
-
-
30644467248
-
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure
-
A. Matheus. Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. In 10th ACM Symposium, on Access Control Models and Technologies (SACMAT 2005), 2005.
-
(2005)
10th ACM Symposium, on Access Control Models and Technologies (SACMAT 2005)
-
-
Matheus, A.1
-
48
-
-
70349111983
-
-
FGDC. Guidelines for providing appropriate access to geospatial data in response to security concerns. http://www.fgdc.gov/policyandplanning/Access- Guidelir June 2005.
-
FGDC. Guidelines for providing appropriate access to geospatial data in response to security concerns. http://www.fgdc.gov/policyandplanning/Access- Guidelir June 2005.
-
-
-
-
50
-
-
0013228158
-
Protecting personal privacy in using geographic information systems
-
H. J. Onsrud, J. P. Johnson, and X. Lopez. Protecting personal privacy in using geographic information systems. Photogrammetic Engineering and Image Processing, 60(9):1083-1095, 1994.
-
(1994)
Photogrammetic Engineering and Image Processing
, vol.60
, Issue.9
, pp. 1083-1095
-
-
Onsrud, H.J.1
Johnson, J.P.2
Lopez, X.3
-
53
-
-
84964853055
-
Foundations of Security Analysis and Design, Tutorial Lectures (FOSAD 2000), chapter Access Control: Policies, Models, and Mechanisms
-
Springer
-
P. Samarati and S. D. C. di Vimercati. Foundations of Security Analysis and Design, Tutorial Lectures (FOSAD 2000), chapter Access Control: Policies, Models, and Mechanisms, pages 137-196. LNCS 2171, Springer, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
di Vimercati, S.D.C.2
-
55
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. A CM Transactions on Information and System Security, 2(1):105-135, 1999.
-
(1999)
A CM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
56
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
58
-
-
0029290760
-
Security constraint processing in a multilevel secure distributed database system
-
B. Thuraisingham and W. Ford. Security constraint processing in a multilevel secure distributed database system. IEEE Transactions on Knowledge and Data Engineering, 7(2):274-293, 1995.
-
(1995)
IEEE Transactions on Knowledge and Data Engineering
, vol.7
, Issue.2
, pp. 274-293
-
-
Thuraisingham, B.1
Ford, W.2
-
61
-
-
0031338080
-
Using digital credentials on the world wide web
-
M. Winslett, N. Ching, V. E. Jones, and I. Slepchin. Using digital credentials on the world wide web. Journal of Computer Security, 5 (3): 255-266, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.3
, pp. 255-266
-
-
Winslett, M.1
Ching, N.2
Jones, V.E.3
Slepchin, I.4
-
62
-
-
0003609051
-
-
Ontario Office of Information and Privacy Commissioner
-
T. Wright. Geographic information systems. Ontario Office of Information and Privacy Commissioner, 1997.
-
(1997)
Geographic information systems
-
-
Wright, T.1
-
63
-
-
52649150749
-
Spatial outsourcing for location-based services
-
Y. Yang, S. Papadopoulos, D. Papadias, and G. Kollios. Spatial outsourcing for location-based services. In Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, 1082-1091, 2008.
-
(2008)
Proceedings of the 24th International Conference on Data Engineering, ICDE 2008
, pp. 1082-1091
-
-
Yang, Y.1
Papadopoulos, S.2
Papadias, D.3
Kollios, G.4
|