-
1
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
doi:10.1145/545186.545190
-
Baldonado, M., Bertino, E. and Ferrari, E. Secure and Selective Dissemination of XML Documents. ACM Transactions on Information and System Security (TISSEC), 5(3):290-331, (2002). doi:10.1145/545186.545190.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.3
, pp. 290-331
-
-
Baldonado, M.1
Bertino, E.2
Ferrari, E.3
-
2
-
-
13844271963
-
Selective and authentic third-party distribution of XML documents
-
doi:10.1109/TKDE.2004.63
-
Bertino, E., Carminati, B., Ferrari, E., Thuraisingham B. and A. Gupta. Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(10), 2004, pp. 1263-1278. doi:10.1109/TKDE.2004.63.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingham, B.4
Gupta, A.5
-
4
-
-
0035330891
-
Securing XML documents with author-X
-
doi:10.1109/4236.935172
-
Bertino, E., Carminati, B. and Ferrari, E. Securing XML Documents with Author-X. IEEE Internet Computing Volume 5, Issue 3 (2001): 21-31. doi:10.1109/4236.935172.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.3
, pp. 21-31
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
-
5
-
-
84954147732
-
Applying hierarchical and role-based access control to XML documents
-
doi:10.1145/1111348.1111353
-
Crampton, J. Applying hierarchical and role-based access control to XML documents. Proc. of the 2004 workshop on Secure web service (2004): 37-46. doi:10.1145/1111348.1111353.
-
(2004)
Proc. of the 2004 Workshop on Secure Web Service
, pp. 37-46
-
-
Crampton, J.1
-
7
-
-
85001697848
-
A fine-grained access control system for XML documents
-
doi:10.1145/505586.505590
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. A Fine-grained Access Control System for XML Documents. ACM Transactions on Information and System Security,5(2): 169-202,(2002). doi:10.1145/505586.505590.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
8
-
-
0038343548
-
Access control: Principles and solutions
-
April. John Wiley and Sons, Inc. doi:10.1002/spe.513
-
De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. Access control: principles and solutions. Software Practice and Experience, Vol, 33, Issue 5 (April 2003): 397-421. John Wiley and Sons, Inc. doi:10.1002/spe.513.
-
(2003)
Software Practice and Experience
, vol.33
, Issue.5
, pp. 397-421
-
-
De Capitani Di Vimercati, S.1
Paraboschi, S.2
Samarati, P.3
-
9
-
-
0035748036
-
Flexible authentication of XML documents
-
ACM Press, doi:10.1145/501983.502003
-
Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G. and S.G. Stubblebine. Flexible Authentication of XML documents. In Proc. of the 8th ACM Conference on Computer and Communications Security, ACM Press, (2001). doi:10.1145/501983.502003.
-
(2001)
Proc. of the 8th ACM Conference on Computer and Communications Security
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.G.6
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
doi:10.1145/501978.501980
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.S. and Chandramouli, R. Proposed NIST Standard for Role-Based Access Control. ACM Trans. on Information and System Security, 4 (3), (2001), 224-274. doi:10.1145/501978.501980.
-
(2001)
ACM Trans. on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.S.4
Chandramouli, R.5
-
15
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany
-
Miklau, G. and Suciu, D. Controlling Access to Published Data Using Cryptography, In Proc. of the 29th VLDB Conference, Berlin, Germany, (2003).
-
(2003)
Proc. of the 29th VLDB Conference
-
-
Miklau, G.1
Suciu, D.2
-
16
-
-
84871789204
-
Using multi-encryption to provide secure and controlled access to XML documents
-
Montreal, Canada
-
Müldner, T., Leighton, G. and Miziolek, J.K. Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents. Extreme Markup Languages 2006, (2006), Montreal, Canada.
-
(2006)
Extreme Markup Languages 2006
-
-
Müldner, T.1
Leighton, G.2
Miziolek, J.K.3
-
17
-
-
84870547521
-
Succinct access control policies for published XML datasets
-
June, Barcelona, Spain
-
Müldner, T., Leighton, G. and Miziolek, J.K. Succinct Access Control Policies for Published XML Datasets. 10th International Conference on Enterprise Information Systems. 12-16, June 2008, Barcelona, Spain.
-
(2008)
10th International Conference on Enterprise Information Systems
, pp. 12-16
-
-
Müldner, T.1
Leighton, G.2
Miziolek, J.K.3
-
18
-
-
36749020421
-
A policy validation framework for enterprise authorization specification
-
doi:10.1109/CSAC.2003.1254336
-
Ramaswamy C. A Policy Validation Framework for Enterprise Authorization Specification. 19th Annual Computer Security Applications Conference ACSAC, (2003): 319-329. doi:10.1109/CSAC.2003.1254336.
-
(2003)
19th Annual Computer Security Applications Conference ACSAC
, pp. 319-329
-
-
Ramaswamy, C.1
-
19
-
-
84870528877
-
-
1.0 (Fourth Edition)
-
Extensible Markup Language (XML) 1.0 (Fourth Edition) http://www.w3.org/TR/REC-xml/.
-
-
-
-
20
-
-
84870549249
-
-
XML Path Language. http://www.w3.org/TR/xpath.
-
-
-
-
21
-
-
84870490020
-
-
XML Schema http://www.w3.org/TR/xmlschema-0/.
-
-
-
-
22
-
-
84870545927
-
Schema based XML security: RBAC approach, 17th IFIP 11.3
-
doi:10.1007/1-4020-8070-0-24
-
Zhang, X., Park, J. and Sandhu, R. Schema based XML Security: RBAC Approach, 17th IFIP 11.3. Working Conference on Data and Application Security, 2003. doi:10.1007/1-4020-8070-0-24.
-
(2003)
Working Conference on Data and Application Security
-
-
Zhang, X.1
Park, J.2
Sandhu, R.3
-
23
-
-
84870530165
-
-
[Xerces2008] http://xerces.apache.org/xerces-c/.
-
(2008)
-
-
-
24
-
-
84870529733
-
-
[Cryptopp++2008] http://www.cryptopp.com/.
-
(2008)
-
-
|