-
5
-
-
84856168460
-
-
[Online], Available
-
StreamBase, "Stream sql." [Online]. Available: http://streambase.com/developers/docs/latest/streamsql/index.html.
-
Stream Sql
-
-
-
6
-
-
84856194033
-
-
[Online], Available
-
Sybase, "Cep sql." [Online]. Available: http://infocenter. sybase.com/help/index.jsp?topic=/com.sybase.infocenter.dc01031.0400/doc/html/ swa1260999782352.html.
-
Cep Sql
-
-
-
7
-
-
84856168459
-
-
[Online], Available
-
Oracle, "Cep." [Online]. Available: http://download.oracle.com/ docs/cd/E13213-01/wlevs/docs30/index.html.
-
Cep
-
-
-
9
-
-
33845638417
-
How to break access control in a controlled manner
-
Washington, DC, USA: IEEE Computer Society
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira- Palhares, D. W. Chadwick, and A. Costa-Pereira, "How to break access control in a controlled manner, " in Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems. Washington, DC, USA: IEEE Computer Society, 2006, pp. 847-854.
-
(2006)
Proceedings of the 19th IEEE Symposium on Computer-Based Medical Systems
, pp. 847-854
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Palhares E.O.-5
Chadwick, D.W.6
Costa-Pereira, A.7
-
10
-
-
77649181757
-
How to securely break into rbac: The btg-rbac model
-
Washington, DC, USA: IEEE Computer Society
-
A. Ferreira, D. Chadwick, P. Farinha, R. Correia, G. Zao, R. Chilro, and L. Antunes, "How to securely break into rbac: The btg-rbac model, " in Proceedings of the 2009 Annual Computer Security Applications Conference, ser. ACSAC'09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 23-31.
-
(2009)
Proceedings of the 2009 Annual Computer Security Applications Conference, Ser. ACSAC'09
, pp. 23-31
-
-
Ferreira, A.1
Chadwick, D.2
Farinha, P.3
Correia, R.4
Zao, G.5
Chilro, R.6
Antunes, L.7
-
11
-
-
70450235104
-
Extending access control models with break-glass
-
New York, NY, USA: ACM
-
A. D. Brucker and H. Petritsch, "Extending access control models with break-glass, " in Proceedings of the 14th ACM symposium on Access control models and technologies, ser. SACMAT'09. New York, NY, USA: ACM, 2009, pp. 197-206.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, Ser. SACMAT'09
, pp. 197-206
-
-
Brucker, A.D.1
Petritsch, H.2
-
12
-
-
78650373769
-
Attribute-based encryption with break-glass
-
ser. Lecture Notes in Computer Science, P. Samarati, M. Tunstall, and J. Posegga, Eds. Heidelberg: Springer-Verlag
-
A. D. Brucker, H. Petritsch, and S. G. Weber, "Attribute-based encryption with break-glass, " in Workshop In Information Security Theory And Practice (WISTP), ser. Lecture Notes in Computer Science, P. Samarati, M. Tunstall, and J. Posegga, Eds. Heidelberg: Springer-Verlag, 2010, no. 6033, pp. 237-244.
-
(2010)
Workshop in Information Security Theory and Practice (WISTP)
, Issue.6033
, pp. 237-244
-
-
Brucker, A.D.1
Petritsch, H.2
Weber, S.G.3
-
13
-
-
78449288160
-
Access control for smarter healthcare using policy spaces
-
November
-
C. Ardagna, S. De Capitani di Vimercati, S. Foresti, T. Grandison, S. Jajodia, and P. Samarati, "Access control for smarter healthcare using policy spaces, " Computers and Security, vol. 29, no. 8, pp. 848-858, November 2010.
-
(2010)
Computers and Security
, vol.29
, Issue.8
, pp. 848-858
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Grandison, T.4
Jajodia, S.5
Samarati, P.6
-
14
-
-
79960184348
-
Rumpole: A flexible break-glass access control model
-
New York, NY, USA: ACM
-
S. Marinovic, R. Craven, J. Ma, and N. Dulay, "Rumpole: a flexible break-glass access control model, " in Proceedings of the 16th ACM symposium on Access control models and technologies, ser. SACMAT'11. New York, NY, USA: ACM, 2011, pp. 73-82.
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, Ser. SACMAT'11
, pp. 73-82
-
-
Marinovic, S.1
Craven, R.2
Ma, J.3
Dulay, N.4
-
15
-
-
84856141026
-
Access control in data management systems
-
Morgan & Claypool Publishers
-
E. Ferrari, Access Control in Data Management Systems, ser. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, 2010.
-
(2010)
Ser. Synthesis Lectures on Data Management
-
-
Ferrari, E.1
-
17
-
-
39549091962
-
Context-aware adaptation of access-control policies
-
DOI 10.1109/MIC.2008.6
-
A. Samuel, A. Ghafoor, and E. Bertino, "Context-aware adaptation of access-control policies, " Internet Computing, IEEE, vol. 12, no. 1, pp. 51 -54, jan.-feb. 2008. (Pubitemid 351279194)
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.1
, pp. 51-54
-
-
Samuel, A.1
Ghafoor, A.2
Bertino, E.3
-
18
-
-
2542514777
-
Amit - The situation manager
-
DOI 10.1007/s00778-003-0108-y
-
A. Adi and O. Etzion, "Amit - the situation manager, " The VLDB Journal, vol. 13, pp. 177-203, May 2004. (Pubitemid 38700768)
-
(2004)
VLDB Journal
, vol.13
, Issue.2
, pp. 177-203
-
-
Adi, A.1
Etzion, O.2
-
19
-
-
78649513699
-
Rule-based composite event queries: The language xchangeeq and its semantics
-
December
-
M. Eckert and F. Bry, "Rule-based composite event queries: the language xchangeeq and its semantics, " Knowl. Inf. Syst., vol. 25, pp. 551-573, December 2010.
-
(2010)
Knowl. Inf. Syst.
, vol.25
, pp. 551-573
-
-
Eckert, M.1
Bry, F.2
-
20
-
-
85128594762
-
The spatec composite event language for spatio-temporal reasoning in mobile systems
-
New York, NY, USA: ACM, pp. 11:1-11:12
-
S. Schwiderski-Grosche and K. Moody, "The spatec composite event language for spatio-temporal reasoning in mobile systems, " in Proceedings of the Third ACM International Conference on Distributed Event- Based Systems, ser. DEBS'09. New York, NY, USA: ACM, 2009, pp. 11:1-11:12.
-
(2009)
Proceedings of the Third ACM International Conference on Distributed Event- Based Systems, Ser. DEBS'09
-
-
Schwiderski-Grosche, S.1
Moody, K.2
-
21
-
-
77955784288
-
Tesla: A formally defined event specification language
-
G. Cugola and A. Margara, "Tesla: a formally defined event specification language, " in DEBS, 2010, pp. 50-61.
-
(2010)
DEBS
, pp. 50-61
-
-
Cugola, G.1
Margara, A.2
-
22
-
-
57249101814
-
Efficient pattern matching over event streams
-
New York, NY, USA: ACM
-
J. Agrawal, Y. Diao, D. Gyllstrom, and N. Immerman, "Efficient pattern matching over event streams, " in Proceedings of the 2008 ACM SIGMOD international conference on Management of data, ser. SIGMOD'08. New York, NY, USA: ACM, 2008, pp. 147-160.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, Ser. SIGMOD'08
, pp. 147-160
-
-
Agrawal, J.1
Diao, Y.2
Gyllstrom, D.3
Immerman, N.4
-
23
-
-
84858664408
-
Sase: Complex event processing over streams
-
D. Gyllstrom, E. Wu, H. Chae, Y. Diao, P. Stahlberg, and G. Anderson, "Sase: Complex event processing over streams, " in In Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007.
-
(2007)
Proceedings of the Third Biennial Conference on Innovative Data Systems Research
-
-
Gyllstrom, D.1
Wu, E.2
Chae, H.3
Diao, Y.4
Stahlberg, P.5
Anderson, G.6
-
24
-
-
77955203039
-
A framework to enforce access control over data streams
-
July, pp. 28:1-28:31
-
B. Carminati, E. Ferrari, J. Cao, and K. L. Tan, "A framework to enforce access control over data streams, " ACM Trans. Inf. Syst. Secur., vol. 13, pp. 28:1-28:31, July 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
-
-
Carminati, B.1
Ferrari, E.2
Cao, J.3
Tan, K.L.4
|