-
2
-
-
84948950552
-
A model for attribute-based user-role assignment
-
M. A. Al-Kahtani and R. Sandhu. A model for attribute-based user-role assignment. In ACSAC, 2002.
-
(2002)
ACSAC
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
4
-
-
39049153474
-
Using attribute-based access control to enable attribute-based messaging
-
R. Bobba, O. Fatemieh, F. Khan, C. A. Gunter, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC, 2006.
-
(2006)
ACSAC
-
-
Bobba, R.1
Fatemieh, O.2
Khan, F.3
Gunter, C.A.4
Khurana, H.5
-
5
-
-
45749089618
-
Purpose based access control for privacy protection in relational database systems
-
J.-W. Byun and N. Li. Purpose based access control for privacy protection in relational database systems. VLDB J., 2008.
-
(2008)
VLDB J.
-
-
Byun, J.-W.1
Li, N.2
-
7
-
-
70349291844
-
Oracle virtual private database
-
O. Corportation
-
O. Corportation. Oracle virtual private database. Technical report, Oracle Corporation, 2005.
-
(2005)
Technical Report, Oracle Corporation
-
-
-
8
-
-
79952787708
-
A framework proposal for fine grained access control
-
C. Costa. A framework proposal for fine grained access control. Informatica, L1(2):99-108, 2006.
-
(2006)
Informatica
, vol.L1
, Issue.2
, pp. 99-108
-
-
Costa, C.1
-
11
-
-
46849108317
-
Towards a fine-grained access control model and mechanisms for semantic databases
-
S. Franzoni, P. Mazzoleni, S. Valtolina, and E. Bertino. Towards a fine-grained access control model and mechanisms for semantic databases. In ICWS, 2007.
-
(2007)
ICWS
-
-
Franzoni, S.1
Mazzoleni, P.2
Valtolina, S.3
Bertino, E.4
-
12
-
-
2442512413
-
EXtensible access control markup language (XACML)
-
August
-
S. Godik and T. Moses. eXtensible Access Control Markup Language (XACML). Technical Report v1.1, OASIS, August 2003.
-
(2003)
Technical Report V1.1, OASIS
-
-
Godik, S.1
Moses, T.2
-
14
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Water. Attribute-based encryption for fine-grained access control of encrypted data. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Water, B.4
-
15
-
-
84888302006
-
-
Apache struts. http://struts.apache.org.
-
Apache Struts
-
-
-
16
-
-
79952778962
-
-
MySQL. http://www.mysql.com.
-
MySQL
-
-
-
18
-
-
57349199277
-
Xengine: A fast and scalable xacml policy evaluation engine
-
A. X. Liu, F. Chen, J. Hwang, and T. Xie. XEngine: A fast and scalable xacml policy evaluation engine. In ACM SIGMETRICS, 2008.
-
(2008)
ACM SIGMETRICS
-
-
Liu, A.X.1
Chen, F.2
Hwang, J.3
Xie, T.4
-
19
-
-
71049192853
-
Statistics & clustering based framework for efficient XACML policy evaluation
-
S. Marouf, M. Shehab, A. Squicciarini, and S. Sundareswaran. Statistics & clustering based framework for efficient XACML policy evaluation. POLICY, 2009.
-
(2009)
POLICY
-
-
Marouf, S.1
Shehab, M.2
Squicciarini, A.3
Sundareswaran, S.4
-
23
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In ACM SIGMOD, 2004.
-
(2004)
ACM SIGMOD
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
24
-
-
34548051377
-
Fine-grained access control to web databases
-
A. Roichman and E. Gudes. Fine-grained access control to web databases. In SACMAT, 2007.
-
(2007)
SACMAT
-
-
Roichman, A.1
Gudes, E.2
-
25
-
-
33645998872
-
Fuzzy identity based encryption
-
A. Sahai and B. Waters. Fuzzy identity based encryption. In Eurocrypt, 2005.
-
(2005)
Eurocrypt
-
-
Sahai, A.1
Waters, B.2
-
26
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
27
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
79952798740
-
Using subject- and object-specific attributes for access control in web-based knowledge management systems
-
G. Stermsek, M. Strembeck, and G. Neumann. Using subject- and object-specific attributes for access control in web-based knowledge management systems. In SKM, 2004.
-
(2004)
SKM
-
-
Stermsek, G.1
Strembeck, M.2
Neumann, G.3
-
30
-
-
79952801763
-
Trust management and trust negotiation in an extension of SQL
-
S. D. Stoller. Trust management and trust negotiation in an extension of SQL. In TGC, 2009.
-
(2009)
TGC
-
-
Stoller, S.D.1
-
32
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM TISSEC, 2003.
-
(2003)
ACM TISSEC
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|