-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
Adam, N.R., Atluri, V., Bertino, E. and Ferrari, E. (2002) ‘A content-based authorization model for digital libraries’, IEEE Transactions on Knowledge and Data Engineering, Vol. 14, pp.296–315.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, pp. 296-315
-
-
Adam, N.R.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
3
-
-
0008724838
-
An authorisation model for temporal and derived data: securing information portals
-
Atluri, V. and Gal, A. (2002) ‘An authorisation model for temporal and derived data: securing information portals’, ACM Transactions on Information Systems Security, Vol. 5, pp.62–94.
-
(2002)
ACM Transactions on Information Systems Security
, vol.5
, pp. 62-94
-
-
Atluri, V.1
Gal, A.2
-
4
-
-
84949747356
-
-
Paper presented at the Fifth European Symposium on Research in Computer Security, Rome, Italy, and Lecture Notes in Computer Science, Springer-Verlag
-
Atluri, V. and Huang, W-K. (1996) ‘An authorization model for workflows’, Paper presented at the Fifth European Symposium on Research in Computer Security, Rome, Italy, and Lecture Notes in Computer Science, Springer-Verlag, pp.44–64. In proceedings.
-
(1996)
An authorization model for workflows
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
5
-
-
84959406219
-
-
Advanced Technology Division Microsoft Corporation, Redmond, WA
-
Barclay, T., Gray, J. and Slutz, D. (1999) ‘Microsoft terraserver: a spatial data warehouse’, Technical report, Microsoft Research, Advanced Technology Division Microsoft Corporation, Redmond, WA.
-
(1999)
‘Microsoft terraserver: a spatial data warehouse’, Technical report, Microsoft Research
-
-
Barclay, T.1
Gray, J.2
Slutz, D.3
-
6
-
-
4243490647
-
-
Technical report, Microsoft Research, Advanced Technology Division, Technical Report MS-TR-2002-53
-
Barclay, T., Gray, J., Strand, E., Ekblad, S. and Richter, J. (2002) ‘Terraservice.net: an introduction to web services’, Technical report, Microsoft Research, Advanced Technology Division, Technical Report MS-TR-2002-53.
-
(2002)
Terraservice.net: an introduction to web services
-
-
Barclay, T.1
Gray, J.2
Strand, E.3
Ekblad, S.4
Richter, J.5
-
7
-
-
2442558027
-
-
Paper presented at the 14th International Workshop on Research Issues in Data Engineering, Web Services for E-Commerce and E-Government Applications, 28–29 March 2004, Boston, MA IEEE Computer Society. In proceedings
-
Bertino E., Damiani M.L. and Momini D. (2004) ‘An access control system for a web map management service’, Paper presented at the 14th International Workshop on Research Issues in Data Engineering, Web Services for E-Commerce and E-Government Applications, 28–29 March 2004, Boston, MA, (pp.33–39). IEEE Computer Society. In proceedings.
-
(2004)
An access control system for a web map management service
, pp. 33-39
-
-
Bertino, E.1
Damiani, M.L.2
Momini, D.3
-
8
-
-
85134887303
-
Specifying and enforcing access control policies for XML document sources
-
Bertino, E., Castano, S., Ferrari, E. and Mesiti, M. (2000) ‘Specifying and enforcing access control policies for XML document sources’, World Wide Web Journal, Vol. 3, pp.139–151.
-
(2000)
World Wide Web Journal
, vol.3
, pp. 139-151
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
9
-
-
30644474741
-
-
Paper presented at the SACMAT ‘05: the 10th ACM symposium on Access control models and technologies
-
Bertino, E., Catania, B., Damiani, M.L., and Perlasca, P. (2005) ‘Geo-rbac: a spatially aware rbac’, Paper presented at the SACMAT ‘05: the 10th ACM symposium on Access control models and technologies, pp.29–37, In proceedings.
-
(2005)
Geo-rbac: a spatially aware rbac
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
10
-
-
0042037951
-
-
Paper presented at the CIKM. In proceedings
-
Bertino, E., Hammad, M.A., Aref, W.G. and Elmagarmid, A.K. (2000b) ‘An access control model for video database systems’, Paper presented at the CIKM. In proceedings.
-
(2000)
An access control model for video database systems
-
-
Bertino, E.1
Hammad, M.A.2
Aref, W.G.3
Elmagarmid, A.K.4
-
11
-
-
0004190705
-
-
Reading, MA: Addison-Wesley
-
Castano, S., Fugini, M., Martella, G. and Samarati, P. (1994) Database Security. Reading, MA: Addison-Wesley.
-
(1994)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
12
-
-
0035159824
-
-
Paper presented at the IEEE International Conference on Image Processing (ICIP 2001) Thessaloniki, Greece
-
Celik, M., Sharma, G., Saber, E. and Tekalp, A. (2001) ‘A hierarchical image authentication watermark with improved localization and security’, Paper presented at the IEEE International Conference on Image Processing (ICIP 2001), pp.502–505, Thessaloniki, Greece. In proceedings.
-
(2001)
A hierarchical image authentication watermark with improved localization and security
, pp. 502-505
-
-
Celik, M.1
Sharma, G.2
Saber, E.3
Tekalp, A.4
-
15
-
-
84951717848
-
-
Paper presented at the DBSec, IFIP Conference, Cambridge, UK. In proceedings
-
Damiani, E., di Vimercati, S.D.C., Fernandez-Medina, E. and Samarati, P. (2003) ‘An access control system for SVG documents’, Paper presented at the DBSec, IFIP Conference, Cambridge, UK. In proceedings.
-
(2003)
An access control system for SVG documents
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Fernandez-Medina, E.3
Samarati, P.4
-
16
-
-
84951717849
-
-
Paper presented at the Ninth International World Wide Web Conference (WWW9). In proceedings
-
Damiani, E., di Vimercati, S.D.C., Paraboschi, S. and Samarati, P. (2000) ‘Design and implementation of an access control processor for XML documents’, Paper presented at the Ninth International World Wide Web Conference (WWW9). In proceedings.
-
(2000)
Design and implementation of an access control processor for XML documents
-
-
Damiani, E.1
di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
18
-
-
84951713331
-
-
Google Press Center
-
Google Earth (2004) Google acquires Keyhole Corp, Google Press Center, Available at: http://www.google.com/press/pressrel/keyhole.html
-
(2004)
Google acquires Keyhole Corp
-
-
Google Earth1
-
20
-
-
30744448197
-
-
paper presented at SACMAT ‘05: the tenth ACM symposium on Access control models and technologies In proceedings
-
Hulsebosch, R., Salden, A., Bargh, M., Ebben, P. and Reitsma, J. (2005) ‘Context sensitive access control’, paper presented at SACMAT ‘05: the tenth ACM symposium on Access control models and technologies, pp.111–119. In proceedings.
-
(2005)
Context sensitive access control
, pp. 111-119
-
-
Hulsebosch, R.1
Salden, A.2
Bargh, M.3
Ebben, P.4
Reitsma, J.5
-
21
-
-
84951717852
-
-
System demo presented at Vortex 2001
-
Keyhole Inc. (2001) Keyhole’s EarthViewer Technology, System demo presented at Vortex 2001, http://www.keyhole.com//body.php?h=news&t=20010522
-
(2001)
Keyhole’s EarthViewer Technology
-
-
-
22
-
-
84951717852
-
-
System demo presented at Vortex 2001
-
Keyhole Inc. (2001) ‘Keyhole’s EarthViewer technology’, System demo presented at Vortex 2001, Available at: http://ww.keyhole.com//body.php?h=news&t=20010522
-
(2001)
Keyhole’s EarthViewer technology
-
-
-
23
-
-
0034450091
-
-
Paper presented at the ACM Conference on Computer and Communication Security (CCS 2000). In proceedings
-
Kudo, M. and Hada, S. (2000) ‘XML document security based on provisional authorization’, Paper presented at the ACM Conference on Computer and Communication Security (CCS 2000). In proceedings.
-
(2000)
XML document security based on provisional authorization
-
-
Kudo, M.1
Hada, S.2
-
24
-
-
84951713099
-
-
Paper presented at IFIP WG 11.3 Thirteenth International Conference on Database Security In proceedings
-
Rosenthal, A., Sciore, E. and Doshi, V. (1999) ‘Security administration for federations, warehouses, and other derived data’, Paper presented at IFIP WG 11.3 Thirteenth International Conference on Database Security, pp.209–223. In proceedings.
-
(1999)
Security administration for federations, warehouses, and other derived data
, pp. 209-223
-
-
Rosenthal, A.1
Sciore, E.2
Doshi, V.3
-
25
-
-
0030216932
-
An authorisation model for a distributed hypertext system
-
Samarati, P., Bertino, E. and Jajodia, S. (1996) ‘An authorisation model for a distributed hypertext system’, IEEE Transactions on Knowledge and Data Engineering, Vol. 8, pp.555–562.
-
(1996)
IEEE Transactions on Knowledge and Data Engineering
, vol.8
, pp. 555-562
-
-
Samarati, P.1
Bertino, E.2
Jajodia, S.3
-
27
-
-
19944409397
-
-
Paper presented at the International Workshop on Interactive Distributed Multimedia Systems and Telcommunication Services Springer Verlag. In proceedings
-
Wang, J., Li, J., Wiederhold, G. and Firschein, O. (1998) ‘System for classifying objectionable websites’, Paper presented at the International Workshop on Interactive Distributed Multimedia Systems and Telcommunication Services, Vol. 1483, pp.113–124, Springer Verlag. In proceedings.
-
(1998)
System for classifying objectionable websites
, vol.1483
, pp. 113-124
-
-
Wang, J.1
Li, J.2
Wiederhold, G.3
Firschein, O.4
-
28
-
-
0032312612
-
-
Paper presented at the IEEE International Conference on Image Processing Chicago, USA. In proceedings
-
Wong, P. (1998) ‘A public key watermark for image verification and authentication’, Paper presented at the IEEE International Conference on Image Processing, pp.425–429, Chicago, USA. In proceedings.
-
(1998)
A public key watermark for image verification and authentication
, pp. 425-429
-
-
Wong, P.1
-
30
-
-
84951717855
-
-
Paper presented at the 19th International Symposium of Computer and Information Sciences (ISCIS 2004), Kemer- Antalya, Turkey. In proceedings
-
Zhang, J. and Xiong, F. (2004) ‘A novel watermarking for image security’, Paper presented at the 19th International Symposium of Computer and Information Sciences (ISCIS 2004), Kemer- Antalya, Turkey. In proceedings.
-
(2004)
A novel watermarking for image security
-
-
Zhang, J.1
Xiong, F.2
-
31
-
-
84951717856
-
-
http://earth.google.com
-
-
-
-
32
-
-
84951717857
-
-
This figure is based on the time of this report
-
This figure is based on the time of this report.
-
-
-
-
33
-
-
84951717858
-
-
http://earth.google.com/coverage/coverage_list.pdf
-
-
-
-
34
-
-
84951717859
-
-
In the strictest sense, subjects include the users and the processes invoked by the users
-
In the strictest sense, subjects include the users and the processes invoked by the users.
-
-
-
-
35
-
-
84951717860
-
-
Available at http://cimic.rutgers.edu/spatial
-
-
-
-
36
-
-
84951717861
-
-
http://www.njmeadowlands.gov
-
-
-
-
37
-
-
84951717862
-
-
For example: http://www.geocode.com/eagle.html-ssi
-
-
-
-
38
-
-
84951717863
-
-
The PKI and public certificate can be used to authenticate not only the user’s identity but also the user’s past scene (geotemporal) credentials
-
The PKI and public certificate can be used to authenticate not only the user’s identity but also the user’s past scene (geotemporal) credentials.
-
-
-
|