-
1
-
-
79955730631
-
-
[Online]. Available
-
"Multi-tenancy architecture." [Online]. Available: http://msdn.microsoft.com/en-us/library/aa479086.aspx
-
Multi-tenancy Architecture
-
-
-
2
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models," IEEE Computer, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
84956993736
-
Role-based authorization constraints specification
-
G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur, pp. 207-226, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
5
-
-
69549094553
-
-
[Online]. Available
-
Ontology. [Online]. Available: http://en.wikipedia.org/wiki/Ontology- (information-science)
-
Ontology
-
-
-
6
-
-
0030193478
-
An organisation ontology for enterprise modeling: Preliminary concepts for linking structure and behaviour
-
M. S. Fox, M. Barbuceanu, and M. Gruninger, "An organisation ontology for enterprise modeling: preliminary concepts for linking structure and behaviour," Comput. Ind., pp. 123-134, 1996. (Pubitemid 126371718)
-
(1996)
Computers in Industry
, vol.29
, Issue.SPEC. ISS.
, pp. 123-134
-
-
Fox, M.S.1
Barbuceanu, M.2
Gruninger, M.3
-
7
-
-
84890006492
-
Ontologies: How can they be built?
-
H. S. Pinto and J. P. Martins, "Ontologies: How can they be built?" Knowl. Inf. Syst., pp. 441-464, 2004.
-
(2004)
Knowl. Inf. Syst.
, pp. 441-464
-
-
Pinto, H.S.1
Martins, J.P.2
-
8
-
-
0035789870
-
A methodology for ontology integration
-
H. S. Pinto and a. P. Martins, Jo "A methodology for ontology integration," in K-CAP '01, 2001, pp. 131-138.
-
(2001)
K-CAP '01
, pp. 131-138
-
-
Pinto, H.S.1
Martins, A.P.2
Jo3
-
9
-
-
51049095973
-
Enriching an ontology with wordnet based on similarity measures
-
M. Warin, H. Oxhammar, and M. Volk, "Enriching an ontology with wordnet based on similarity measures," in MEANING-2005 Workshop, 2005.
-
(2005)
MEANING-2005 Workshop
-
-
Warin, M.1
Oxhammar, H.2
Volk, M.3
-
10
-
-
0003585297
-
-
San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
-
J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2005.
-
(2005)
Data Mining: Concepts and Techniques
-
-
Han, J.1
-
13
-
-
0036361233
-
Approximate XML joins
-
S. Guha, H. V. Jagadish, N. Koudas, D. Srivastava, and T. Yu, "Approximate xml joins," in SIGMOD '02, 2002, pp. 287-298. (Pubitemid 34985555)
-
(2002)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 287-298
-
-
Guha, S.1
Jagadish, H.V.2
Koudas, N.3
Srivastava, D.4
Yu, T.5
-
14
-
-
18444373554
-
A survey on tree edit distance and related problems
-
DOI 10.1016/j.tcs.2004.12.030, PII S0304397505000174
-
P. Bille, "A survey on tree edit distance and related problems," Theor. Comput. Sci., pp. 217-239, 2005. (Pubitemid 40644674)
-
(2005)
Theoretical Computer Science
, vol.337
, Issue.1-3
, pp. 217-239
-
-
Bille, P.1
-
15
-
-
0018491659
-
The tree-to-tree correction problem
-
K.-C. Tai, "The tree-to-tree correction problem," J. ACM, pp. 422-433, 1979.
-
(1979)
J. ACM
, pp. 422-433
-
-
Tai, K.-C.1
-
16
-
-
0024889169
-
Simple fast algorithms for the editing distance between trees and related problems
-
K. Zhang and D. Shasha, "Simple fast algorithms for the editing distance between trees and related problems," SIAM J. Comput., pp. 1245-1262, 1989. (Pubitemid 20613578)
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.6
, pp. 1245-1262
-
-
Zhang Kaizhong1
Shasha Dennis2
-
17
-
-
84896693236
-
Computing the Edit-Distance Between Unrooted Ordered Trees
-
P. N. Klein, "Computing the edit-distance between unrooted ordered trees," in ESA'98, 1998, pp. 91-102. (Pubitemid 128117046)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1461
, pp. 91-102
-
-
Klein, P.N.1
-
18
-
-
0035790675
-
The role-based access control system of a european bank: A case study and discussion
-
A. Schaad, J. Moffett, and J. Jacob, "The role-based access control system of a european bank: a case study and discussion," in SACMAT '01, 2001, pp. 3-9.
-
(2001)
SACMAT '01
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
21
-
-
84893309371
-
A framework for efficient storage security in rdbms
-
B. Iyer, S. Mehrotra, E. Mykletun, G. Tsudik, and Y. Wu, "A framework for efficient storage security in rdbms," in In EDBT, 2004.
-
(2004)
EDBT
-
-
Iyer, B.1
Mehrotra, S.2
Mykletun, E.3
Tsudik, G.4
Wu, Y.5
-
22
-
-
0033652039
-
The nist model for role-based access control: Towards a unified standard
-
R. Sandhu, D. Ferraiolo, and R. Kuhn, "The nist model for role-based access control: towards a unified standard," in RBAC '00, 2000, pp. 47-63.
-
(2000)
RBAC '00
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
23
-
-
1942532238
-
Xml-based specification for web services document security
-
R. Bhatti, E. Bertino, A. Ghafoor, and J. B. D. Joshi, "Xml-based specification for web services document security," Computer, pp. 41-49, 2004.
-
(2004)
Computer
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.B.D.4
-
25
-
-
4143123270
-
A meta model for authorisations in application security systems and their integration into rbac administration
-
A. Kern, M. Kuhlmann, R. Kuropka, and A. Ruthert, "A meta model for authorisations in application security systems and their integration into rbac administration," in SACMAT '04, 2004, pp. 87-96.
-
(2004)
SACMAT '04
, pp. 87-96
-
-
Kern, A.1
Kuhlmann, M.2
Kuropka, R.3
Ruthert, A.4
-
26
-
-
4143092573
-
Administrative scope in the graph-based framework
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce, "Administrative scope in the graph-based framework," in SACMAT '04, 2004, pp. 97-104.
-
(2004)
SACMAT '04
, pp. 97-104
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
27
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
28
-
-
17444406680
-
A generalized temporal role-based access control model
-
DOI 10.1109/TKDE.2005.1
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A generalized temporal role-based access control model," IEEE Trans. on Knowl. and Data Eng., vol. 17, no. 1, pp. 4-23, 2005. (Pubitemid 40536468)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
30
-
-
3042530575
-
Role-based access control features in commercial database management systems
-
R. S
-
C. Ramaswamy, R. Sandhu, R. Ramaswamy, and R. S, "Role-based access control features in commercial database management systems," in NIST-NCSC, 1998, pp. 503-511.
-
(1998)
NIST-NCSC
, pp. 503-511
-
-
Ramaswamy, C.1
Sandhu, R.2
Ramaswamy, R.3
-
31
-
-
0037362986
-
Role-based access control with x.509 attribute certificates
-
D. W. Chadwick, A. Otenko, and E. Ball, "Role-based access control with x.509 attribute certificates," IEEE Internet Computing, pp. 62-69, 2003.
-
(2003)
IEEE Internet Computing
, pp. 62-69
-
-
Chadwick, D.W.1
Otenko, A.2
Ball, E.3
-
32
-
-
85034775239
-
Views and security in distributed database management systems
-
E. Bertino and L. M. Haas, "Views and security in distributed database management systems," in EDBT '88, pp. 155-169.
-
EDBT '88
, pp. 155-169
-
-
Bertino, E.1
Haas, L.M.2
-
35
-
-
33646406549
-
Representation and reasoning on rbac: A description logic approach
-
C. Zhao, N. Heilili, S. Liu, and Z. Lin, "Representation and reasoning on rbac: A description logic approach," in In ICTAC, 2005, pp. 381-393.
-
(2005)
ICTAC
, pp. 381-393
-
-
Zhao, C.1
Heilili, N.2
Liu, S.3
Lin, Z.4
-
36
-
-
55549143296
-
Automated verification of access control policies using a sat solver
-
G. Hughes and T. Bultan, "Automated verification of access control policies using a sat solver," Int. J. Softw. Tools Technol. Transf., pp. 503-520, 2008.
-
(2008)
Int. J. Softw. Tools Technol. Transf.
, pp. 503-520
-
-
Hughes, G.1
Bultan, T.2
-
37
-
-
57349182523
-
Rowlbac: Representing role based access control in owl
-
T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham, "Rowlbac: representing role based access control in owl," in SACMAT '08, 2008, pp. 73-82.
-
(2008)
SACMAT '08
, pp. 73-82
-
-
Finin, T.1
Joshi, A.2
Kagal, L.3
Niu, J.4
Sandhu, R.5
Winsborough, W.6
Thuraisingham, B.7
-
38
-
-
79955738144
-
Ontology based access control derived from dynamic rbac and its context constraints
-
A. Macfie, P. Kataria, N. Koay, H. Dagdeviren, R. Juric, and K. Madani, "Ontology based access control derived from dynamic rbac and its context constraints." in IDPT 2008, 2008.
-
(2008)
IDPT 2008
-
-
Macfie, A.1
Kataria, P.2
Koay, N.3
Dagdeviren, H.4
Juric, R.5
Madani, K.6
|