메뉴 건너뛰기




Volumn 5776 LNCS, Issue , 2009, Pages 68-88

An access control language for a general provenance model

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL LANGUAGE; DATA SECURITY; PERSONAL PREFERENCES;

EID: 70349885378     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04219-5_5     Document Type: Conference Paper
Times cited : (48)

References (32)
  • 2
    • 33750035572 scopus 로고    scopus 로고
    • Technical Report TR- 04-06, Harvard University Computer Science January
    • Braun, U., Shinnar, A.: A security model for provenance. Technical Report TR- 04-06, Harvard University Computer Science (January 2006)
    • (2006) A Security Model for Provenance
    • Braun, U.1    Shinnar, A.2
  • 5
    • 33846076805 scopus 로고    scopus 로고
    • Provenance management in curated databases
    • Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: SIGMOD 2006, pp. 539-550 (2006)
    • (2006) SIGMOD 2006 , pp. 539-550
    • Buneman, P.1    Chapman, A.2    Cheney, J.3
  • 9
    • 33750087260 scopus 로고    scopus 로고
    • Security issues in a soa-based provenance system
    • Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
    • Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a soa-based provenance system. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 203-211. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4145 , pp. 203-211
    • Tan, V.1    Groth, P.2    Miles, S.3    Jiang, S.4    Munroe, S.5    Tsasakou, S.6    Moreau, L.7
  • 12
    • 84948706138 scopus 로고    scopus 로고
    • Chimera: Avirtual data system for representing, querying, and automating data derivation
    • IEEE Computer Society, Los Alamitos
    • Foster, I.T., V̈ockler, J.S., Wilde, M., Zhao, Y.: Chimera: Avirtual data system for representing, querying, and automating data derivation. In: SSDBM, pp. 37-46. IEEE Computer Society, Los Alamitos (2002)
    • (2002) SSDBM , pp. 37-46
    • Foster, I.T.1    V̈ockler, J.S.2    Wilde, M.3    Zhao, Y.4
  • 13
    • 57649219475 scopus 로고    scopus 로고
    • A data model and architecture for long-term preservation
    • Larsen, R.L., Paepcke, A., Borbinha, J.L., Naaman, M. (eds.) ACM, New York
    • Janee, G., Mathena, J., Frew, J.: A data model and architecture for long-term preservation. In: Larsen, R.L., Paepcke, A., Borbinha, J.L., Naaman, M. (eds.) JCDL, pp. 134-144. ACM, New York (2008)
    • (2008) JCDL , pp. 134-144
    • Janee, G.1    Mathena, J.2    Frew, J.3
  • 14
    • 84961839008 scopus 로고    scopus 로고
    • Towards provenance-enabling paraview
    • Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. Springer, Heidelberg
    • Callahan, S.P., Freire, J., Scheidegger, C.E., Silva, C.T., Vo, H.T.: Towards provenance-enabling paraview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol.5272, pp. 120-127. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5272 , pp. 120-127
    • Callahan, S.P.1    Freire, J.2    Scheidegger, C.E.3    Silva, C.T.4    Vo, H.T.5
  • 15
    • 79960570447 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. Springer, Heidelberg
    • Buneman, P., Khanna, S., Tan, W.-C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.1973, pp. 316-330. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.1973 , pp. 316-330
    • Buneman, P.1    Khanna, S.2    Tan, W.-C.3
  • 16
    • 70349868875 scopus 로고
    • A generalized framework for database access controls
    • Abrams, M.D., Smith, G.W.: A generalized framework for database access controls. In: DBSec., pp. 171-178 (1990)
    • (1990) DBSec , pp. 171-178
    • Abrams, M.D.1    Smith, G.W.2
  • 18
    • 0242456750 scopus 로고    scopus 로고
    • Towards usage control models: Beyond traditional access control
    • Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: SACMAT, pp. 57-64 (2002)
    • (2002) SACMAT , pp. 57-64
    • Park, J.1    Sandhu, R.S.2
  • 19
    • 84893070616 scopus 로고    scopus 로고
    • Originator control in usage control
    • IEEE Computer Society, Los Alamitos
    • Park, J., Sandhu, R.S.: Originator control in usage control. In: POLICY, pp. 60-66. IEEE Computer Society, Los Alamitos (2002)
    • (2002) POLICY , pp. 60-66
    • Park, J.1    Sandhu, R.S.2
  • 20
    • 57349158498 scopus 로고    scopus 로고
    • An obligation model bridging access control policies and privacy policies
    • Ray, I., Li, N. (eds.) ACM, New York
    • Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Ray, I., Li, N. (eds.) SACMAT, pp. 133-142. ACM, New York (2008)
    • (2008) SACMAT , pp. 133-142
    • Ni, Q.1    Bertino, E.2    Lobo, J.3
  • 21
    • 33746637552 scopus 로고    scopus 로고
    • An algebra for enterprise privacy policies closed under composition and conjunction
    • Muller, G. (ed.) ETRICS 2006. Springer, Heidelberg
    • Raub, D., Steinwandt, R.: An algebra for enterprise privacy policies closed under composition and conjunction. In: Muller, G. (ed.) ETRICS 2006. LNCS, vol.3995, pp. 130-144. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.3995 , pp. 130-144
    • Raub, D.1    Steinwandt, R.2
  • 22
    • 33751063543 scopus 로고    scopus 로고
    • Privacy and contextual integrity: Framework and applications
    • IEEE Computer Society, Los Alamitos
    • Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy, pp. 184-198. IEEE Computer Society, Los Alamitos (2006)
    • (2006) IEEE Symposium on Security and Privacy , pp. 184-198
    • Barth, A.1    Datta, A.2    Mitchell, J.C.3    Nissenbaum, H.4
  • 23
    • 34548016110 scopus 로고    scopus 로고
    • Privacy-aware role based access control.
    • In: Lotz, V., Thuraisingham, B.M. (eds.) ACM, New York
    • Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Lotz, V., Thuraisingham, B.M. (eds.) SACMAT, pp. 41-50. ACM, New York (2007)
    • (2007) SACMAT , pp. 41-50
    • Ni, Q.1    Trombetta, A.2    Bertino, E.3    Lobo, J.4
  • 25
    • 77949300720 scopus 로고    scopus 로고
    • D-algebra for composing access control policy decisions
    • Ni, Q., Bertino, E., Lobo, J.: D-algebra for composing access control policy decisions. In: ASIACCS (2009)
    • (2009) ASIACCS
    • Ni, Q.1    Bertino, E.2    Lobo, J.3
  • 29
    • 35048835357 scopus 로고    scopus 로고
    • Abstracting and refining authorization in sql
    • Jonker, W., Petkovic, M. (eds.) SDM 2004. Springer, Heidelberg
    • Rosenthal, A., Sciore, E.: Abstracting and refining authorization in sql. In: Jonker, W., Petkovic, M. (eds.) SDM 2004. LNCS, vol.3178, pp. 148-162. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3178 , pp. 148-162
    • Rosenthal, A.1    Sciore, E.2
  • 30
    • 69949149767 scopus 로고    scopus 로고
    • A formal framework for reffective database access control policies
    • Ning, P., Syverson, P.F., Jha, S. (eds.) ACM, New York
    • Olson, L.E., Gunter, C.A., Madhusudan, P.: A formal framework for reffective database access control policies. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 289-298. ACM, New York (2008)
    • (2008) ACM Conference on Computer and Communications Security , pp. 289-298
    • Olson, L.E.1    Gunter, C.A.2    Madhusudan, P.3
  • 31
    • 38049002527 scopus 로고    scopus 로고
    • Conditional privacy-aware role based access control
    • Biskup, J., Lopez, J. (eds.) ESORICS 2007. Springer, Heidelberg
    • Ni, Q., Lin, D., Bertino, E., Lobo, J.: Conditional privacy-aware role based access control. In: Biskup, J., Lopez, J. (eds.) ESORICS 2007. LNCS, vol.4734, pp. 72-89. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 72-89
    • Ni, Q.1    Lin, D.2    Bertino, E.3    Lobo, J.4
  • 32
    • 70349849208 scopus 로고    scopus 로고
    • Wang, J.T.L. (ed.) Wang, J.T.L. (ed.) SIGMOD 2008, SIGMOD Conference, Vancouver, BC, Canada, June 10-12, ACM, New York
    • Wang, J.T.L. (ed.): Proceedings of the ACM SIGMOD International Conference on Management of Data. In: Wang, J.T.L. (ed.) SIGMOD 2008, SIGMOD Conference, Vancouver, BC, Canada, June 10-12, ACM, New York (2008)
    • (2008) Proceedings of the ACM SIGMOD International Conference on Management of Data


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.