-
4
-
-
84976845043
-
End-to-end arguments in system design
-
Saltzer, J.H., Reed, D.P., Clark, D.D.: End-to-end arguments in system design. ACM Transactions on Computer Systems (TOCS) 2(4), 277-288 (1984)
-
(1984)
ACM Transactions on Computer Systems (TOCS)
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
5
-
-
70350403461
-
-
Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December, December
-
Regulation (EC) No 45/2001 of the European Parliament and of the Council of 18 December 2000. Official Journal of the European Communities (December 2001)
-
(2000)
Official Journal of the European Communities
-
-
-
6
-
-
27944499752
-
A reference model and system architecture for database firewall
-
Cai, L., Yang, X.: A reference model and system architecture for database firewall. In: Proceedings of IEEE SMC 2005, pp. 504-509 (2005)
-
(2005)
Proceedings of IEEE
, vol.SMC 2005
, pp. 504-509
-
-
Cai, L.1
Yang, X.2
-
7
-
-
39049165762
-
Towards Database Firewall: Mining the Damage Spreading Patterns
-
Bai, K., Wang, H., Liu, P.: Towards Database Firewall: Mining the Damage Spreading Patterns. In: Proceedings of ACSAC 2006, pp. 178-192 (2006)
-
(2006)
Proceedings of ACSAC
, pp. 178-192
-
-
Bai, K.1
Wang, H.2
Liu, P.3
-
9
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proceedings of the IEEE 63(9), 1278-1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
10
-
-
85180411878
-
Improved proxy re-encryption schemes with applications to secure distributed storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 12th Annual Network and Distributed Systems Security Symposium, NDSS 2005 (2005)
-
(2005)
Proceedings of the 12th Annual Network and Distributed Systems Security Symposium, NDSS
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
11
-
-
84957718934
-
Divertible protocols and atomic proxy cryptography
-
Nyberg, K, ed, EUROCRYPT 1998, Springer, Heidelberg
-
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1403
, pp. 127-144
-
-
Blaze, M.1
Bleumer, G.2
Strauss, M.3
-
14
-
-
84869646818
-
-
March 2008
-
Cisco ACE XML Gateway (March 2008), http://www.cisco.com/en/US/products/ ps7314/index.html
-
Cisco ACE XML Gateway
-
-
-
16
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Transactions on Information and System Security (TISSEC) 5(2), 169-202 (2002)
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
17
-
-
18744396386
-
QFilter: Fine-grained run-time XML access control via NFA-based query rewriting
-
Luo, B., Lee, D., Lee, W.C., Liu, P.: QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: The Thirteenth ACM International Conference on Information and Knowledge Management, pp. 543-552 (2004)
-
(2004)
The Thirteenth ACM International Conference on Information and Knowledge Management
, pp. 543-552
-
-
Luo, B.1
Lee, D.2
Lee, W.C.3
Liu, P.4
-
20
-
-
33746637903
-
-
Stavrou, A., Locasto, M., Keromytis, A.: W3bcrypt: Encryption as a stylesheet. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 349-364. Springer, Heidelberg (2006)
-
Stavrou, A., Locasto, M., Keromytis, A.: W3bcrypt: Encryption as a stylesheet. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 349-364. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
77952376569
-
Automaton segmentation: A new approach to preserve privacy in XML information brokering
-
CCS
-
Li, F., Luo, B., Liu, P., Lee, D., Chu, C.H.: Automaton segmentation: A new approach to preserve privacy in XML information brokering. In: Proceedings of the 14th ACM conference on Computer and Communications Security (CCS) (2007)
-
(2007)
Proceedings of the 14th ACM conference on Computer and Communications Security
-
-
Li, F.1
Luo, B.2
Liu, P.3
Lee, D.4
Chu, C.H.5
-
24
-
-
33749078189
-
Orchestrating composite web services under data flow constraints
-
Chafle, G., Chandra, S., Mann, V., Nanda, M.G.: Orchestrating composite web services under data flow constraints. In: Proceedings of the IEEE International Conference on Web Services, pp. 211-218 (2005)
-
(2005)
Proceedings of the IEEE International Conference on Web Services
, pp. 211-218
-
-
Chafle, G.1
Chandra, S.2
Mann, V.3
Nanda, M.G.4
-
25
-
-
0037623983
-
Identity-based encryption from the Weil Pairing
-
Boneh, D., Franklin, M.: Identity-based encryption from the Weil Pairing. SIAM Journal of Computing 32(2), 586-615 (2003)
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.2
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
26
-
-
70350371974
-
-
Keromytis, A.D., Wright, J.L., de Raadt, T.: The Design of the OpenBSD Cryptographic Framework. In: Proceedings of the USENIX Annual Technical Conference, June 2003, pp. 181-196 (2003)
-
Keromytis, A.D., Wright, J.L., de Raadt, T.: The Design of the OpenBSD Cryptographic Framework. In: Proceedings of the USENIX Annual Technical Conference, June 2003, pp. 181-196 (2003)
-
-
-
-
27
-
-
70350368160
-
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specifcation (April 2002)
-
Cranor, L., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J.: The Platform for Privacy Preferences 1.0 (P3P1.0) Specifcation (April 2002)
-
-
-
|