-
1
-
-
37849050601
-
Towards a times- based usage control model
-
B. Zhao, R. Sandhu, X. Zhang and X. Qin, Towards a Times- Based Usage Control Model, In: Lecture Notes in Computer Science, vol. 4602, pp. 227-242 (2007).
-
(2007)
Lecture Notes in Computer Science
, vol.4602
, pp. 227-242
-
-
Zhao, B.1
Sandhu, R.2
Zhang, X.3
Qin, X.4
-
3
-
-
18744396386
-
QFilter: Fine-grained run time XML access control via NFA-based query rewriting
-
B. Luo, D. Lee, W.-C. Lee and P. Liu, QFilter: Fine-Grained Run Time XML Access Control via NFA-based Query Rewriting, In: Conference on Information and Knowledge Management, Proceedings of the thirteenth ACM international conference on Information and knowledge management, pp. 543-552, (2004).
-
(2004)
Conference on Information and Knowledge Management, Proceedings of the Thirteenth ACM International Conference on Information and Knowledge Management
, pp. 543-552
-
-
Luo, B.1
Lee, D.2
Lee, W.-C.3
Liu, P.4
-
6
-
-
50049101018
-
A keyword based filtering technique of document centric XML using NFA representation
-
2007
-
C. Byun, K. Lee and S. Park, A keyword based filtering technique of document centric XML using NFA representation, In: Int. J. Appl. Math. Comput. Sci. 4 (3) (2007), pp. 136-143 (2007).
-
(2007)
Int. J. Appl. Math. Comput. Sci.
, vol.4
, Issue.3
, pp. 136-143
-
-
Byun, C.1
Lee, K.2
Park, S.3
-
8
-
-
3543109672
-
Access control of XML documents considering update operations
-
C.-H. Lim, S. Park and S. H. Son, Access Control of XML Documents Considering Update Operations, In: Workshop On XML Security, Proceedings of the 2003 ACM workshop on XML security, pp.49-59 (2003).
-
(2003)
Workshop on XML Security, Proceedings of the 2003 ACM Workshop on XML Security
, pp. 49-59
-
-
Lim, C.-H.1
Park, S.2
Son, S.H.3
-
9
-
-
84992227458
-
Proposed NIST standard for role based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn and R. Chandramouli, Proposed NIST Standard for Role Based Access Control, In: ACM Transactions on Information and System Security, N. 3, vol. 4, pp. 222-274 (2001).
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 222-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
10
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi and P. Samarati, A fine-grained access control system for XML documents, In: ACM Transactions on Information and System Security (TISSEC) Vol. 5, pp. 169-202 (2002).
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
12
-
-
4544375498
-
An operational model and language support for securing XML documents
-
G.-H. Hwang and T.-K. Chang, An operational model and language support for securing XML documents, In: Computers & Security, pp.505-525 (2004).
-
(2004)
Computers & Security
, pp. 505-525
-
-
Hwang, G.-H.1
Chang, T.-K.2
-
13
-
-
62249216277
-
Formal modeling and analysis of XML firewall for service-oriented systems
-
H. Xu, M. Ayachit and A. Reddyreddy, Formal Modeling And Analysis Of XML Firewall For Service-Oriented Systems, In: Int. J. Security and Networks, No. 3, Vol. 3, pp.5-8 (2008).
-
(2008)
Int. J. Security and Networks
, vol.3
, Issue.3
, pp. 5-8
-
-
Xu, H.1
Ayachit, M.2
Reddyreddy, A.3
-
14
-
-
77954525788
-
-
IBM Corporation Software Group, In: IBM Corporation 2008
-
IBM Corporation Software Group, IBM WebSphere DataPower XML Security Gateway XS40, In: IBM Corporation 2008, pp. 2-4 (2008).
-
(2008)
IBM WebSphere DataPower XML Security Gateway XS40
, pp. 2-4
-
-
-
16
-
-
3142523603
-
The UCONABC usage control model
-
J. Park and R. Sandhu, The UCONABC Usage Control Model, In: ACM Transactions on Information and System Security, No. 1, Vol. 7, pp. 7-14 (2004).
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 7-14
-
-
Park, J.1
Sandhu, R.2
-
17
-
-
85009084595
-
Towards SMIL as a foundation for multimodal, multimedia applications
-
J. Beckham, G. Di Fabbrizio and N. Klarlund, Towards SMIL as a Foundation for Multimodal, Multimedia Applications, In: W3C Position Paper, pp. 1363-1366 (2001).
-
(2001)
W3C Position Paper
, pp. 1363-1366
-
-
Beckham, J.1
Fabbrizio, G.D.2
Klarlund, N.3
-
19
-
-
64349111952
-
A new virtual private network for today's mobile world
-
K. Heyman, A New Virtual Private Network for Today's Mobile World, In: TECHNOLOGY NEWS, pp. 17-19 (2007).
-
(2007)
Technology News
, pp. 17-19
-
-
Heyman, K.1
-
20
-
-
84893844864
-
AFilter: Adaptable XML filtering with prefix-caching suffix-clustering
-
K.S. Candan, W.-P. Hsiung, S. Chen, J. Tatemura and D. Agrawal, AFilter: adaptable XML filtering with prefix-caching suffix-clustering, In: Proceedings of the 32nd VLDB Conference, pp. 559-570 (2006).
-
(2006)
Proceedings of the 32nd VLDB Conference
, pp. 559-570
-
-
Candan, K.S.1
Hsiung, W.-P.2
Chen, S.3
Tatemura, J.4
Agrawal, D.5
-
21
-
-
84958784177
-
An introduction to the theoretical aspects of coloured Petri Nets
-
LNCS, Verlag
-
K. Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, In: A Decade of Concurrency, LNCS, vol. 803, Verlag, pp.230-272 (1994).
-
(1994)
A Decade of Concurrency
, vol.803
, pp. 230-272
-
-
Jensen, K.1
-
22
-
-
0016984825
-
Protection in operating systems
-
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, Protection in Operating Systems, In: Communication of the ACM, N. 8, pp. 461-471 (1976).
-
(1976)
Communication of the ACM
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
23
-
-
84877335908
-
Efficient filtering of XML documents for selective dissemination of information
-
M. Altinel and M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, In: Proceedings of the 26th VLDB Conference, pp. 53-64 (2000).
-
(2000)
Proceedings of the 26th VLDB Conference
, pp. 53-64
-
-
Altinel, M.1
Franklin, M.J.2
-
25
-
-
77954480087
-
XML to XML through XML
-
P. Lemmens and G.-J. Houben, XML to XML through XML, In: WebNet 2001: pp. 772-777 (2001).
-
(2001)
WebNet 2001
, pp. 772-777
-
-
Lemmens, P.1
Houben, G.-J.2
-
26
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
R. Thomas and R. Sandhu, Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management., In: the 11th IFIP Working Conference on Database Security, pp. 1-2 (1997).
-
(1997)
11th IFIP Working Conference on Database Security
, pp. 1-2
-
-
Thomas, R.1
Sandhu, R.2
-
27
-
-
29144484106
-
A methodology for clustering XML documents by structure
-
T. Dalamagas, T. Cheng, K.-J. Winkel and T. Sellis, A methodology for clustering XML documents by structure, In: Information Systems, pp. 187-228 (2006).
-
(2006)
Information Systems
, pp. 187-228
-
-
Dalamagas, T.1
Cheng, T.2
Winkel, K.-J.3
Sellis, T.4
-
28
-
-
35248817413
-
Security, privacy, and anonymity
-
T. Wright, Security, Privacy, and Anonymity, In: The ACM StudentMagazine, pp. 1-2 (2004).
-
(2004)
ACM StudentMagazine
, pp. 1-2
-
-
Wright, T.1
-
30
-
-
77949271705
-
Automatic web information extraction in the ROADRUNNER system
-
Revised Papers from the
-
V. Crescenzi, G. Mecca and P. Merialdo, Automatic Web Information Extraction in the ROADRUNNER System, In: Revised Papers from the HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops, pp. 264-277 (2001).
-
(2001)
HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops
, pp. 264-277
-
-
Crescenzi, V.1
Mecca, G.2
Merialdo, P.3
-
31
-
-
70350394975
-
Enterprise digital rights management: Solutions against Information Theft by Insiders
-
Y. Yu and T.-C. Chiueh, Enterprise Digital Rights Management: Solutions against Information Theft by Insiders, In: Research Proficiency Examination (RPE) report, pp. 2-24 (2004).
-
(2004)
Research Proficiency Examination (RPE) Report
, pp. 2-24
-
-
Yu, Y.1
Chiueh, T.-C.2
-
32
-
-
3042746680
-
Path sharing and predicate evaluation for high performance XML filtering
-
2003
-
Y. Diao, M. Altinel, M.J. Franklin, H. Zhang and P. Fischer, Path sharing and predicate evaluation for high performance XML filtering, In: ACM Trans. Database Syst. 28 (4) (2003), pp. 467-516 (2003).
-
(2003)
ACM Trans. Database Syst.
, vol.28
, Issue.4
, pp. 467-516
-
-
Diao, Y.1
Altinel, M.2
Franklin, M.J.3
Zhang, H.4
Fischer, P.5
|