-
1
-
-
34250735599
-
High-performance complex event processing over streams
-
E. Wu et al., "High-performance complex event processing over streams, " in SIGMOD, 2006, pp. 407-418.
-
(2006)
SIGMOD
, pp. 407-418
-
-
Wu, E.1
-
2
-
-
2442617843
-
Issues in data stream management
-
L. Golab and M. T. Ozsu, "Issues in data stream management, " SIGMOD Rec., vol. 32, no. 2, pp. 5-14, 2003.
-
(2003)
SIGMOD Rec
, vol.32
, Issue.2
, pp. 5-14
-
-
Golab, L.1
Ozsu, M.T.2
-
3
-
-
33745607641
-
Nile-PDT: A phenomenon detection and tracking framework for dsmss
-
M. Ali et al., "Nile-PDT: a phenomenon detection and tracking framework for dsmss, " in VLDB, 2005, pp. 1295-1298.
-
(2005)
VLDB
, pp. 1295-1298
-
-
Ali, M.1
-
4
-
-
0030086382
-
Role-based access control models
-
[Online], Available: citeseer.ist.psu.edu/sandhu96rolebased.html
-
R. Sandhu et al., "Role-based access control models, " IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996. [Online]. Available: citeseer.ist.psu.edu/sandhu96rolebased.html.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
-
8
-
-
84874857739
-
A comparison of compression techniques for xml-based security policies in mobile computing environments
-
April 27
-
R. Qing and C. Adams, "A comparison of compression techniques for xml-based security policies in mobile computing environments, " in Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp. 209-232.
-
(2005)
Proceedings of the Workshop on New Challenges for Access Control (NCAC)
, pp. 209-232
-
-
Qing, R.1
Adams, C.2
-
9
-
-
52649140439
-
Security punctuation framework for enforcing access control on streaming data
-
R. Nehme et al., "Security punctuation framework for enforcing access control on streaming data, " in ICDE, 2008.
-
(2008)
ICDE
-
-
Nehme, R.1
-
10
-
-
77952763862
-
FENCE: Continuous access control enforcement in dynamic data stream environments
-
R. Nehme et al., "FENCE: Continuous Access Control Enforcement in Dynamic Data Stream Environments, " in ICDE, 2010.
-
(2010)
ICDE
-
-
Nehme, R.1
-
11
-
-
18744383467
-
Cape: Continuous query engine with heterogeneous-grained adaptivity
-
E. Rundensteiner et al., "Cape: Continuous query engine with heterogeneous-grained adaptivity, " in VLDB, 2004.
-
(2004)
VLDB
-
-
Rundensteiner, E.1
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo et al., "Proposed NIST standard for role-based access control, " ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
-
13
-
-
0030732547
-
An extended authorization model for relational databases
-
E. Bertino et al., "An extended authorization model for relational databases, " TKDE, vol. 9, no. 1, pp. 85-101, 1997.
-
(1997)
TKDE
, vol.9
, Issue.1
, pp. 85-101
-
-
Bertino, E.1
-
14
-
-
70450265317
-
Supporting RBAC with XACML+OWL
-
Stresa, Italy, June 3-5
-
R. Ferrini and E. Bertino, "Supporting RBAC with XACML+OWL, " 14th ACM Symposium on Access Control Models and Technologies(SACMAT 2009), Stresa, Italy, June 3-5, 2009.
-
(2009)
14th ACM Symposium on Access Control Models and Technologies(SACMAT 2009)
-
-
Ferrini, R.1
Bertino, E.2
-
15
-
-
3142523600
-
A propositional policy algebra for access control
-
D. Wijesekera and S. Jajodia, "A propositional policy algebra for access control, " ACM TISSEC, vol. 6, no. 2, pp. 286-325, 2003.
-
(2003)
ACM TISSEC
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
16
-
-
3142749878
-
Secure XML querying with security views
-
W. Fan, C. Chan, and M. Garofalakis, "Secure XML querying with security views, " in SIGMOD, 2004, pp. 587-598.
-
(2004)
SIGMOD
, pp. 587-598
-
-
Fan, W.1
Chan, C.2
Garofalakis, M.3
-
17
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi et al., "Extending query rewriting techniques for fine-grained access control, " in SIGMOD, 2004, pp. 551-562.
-
(2004)
SIGMOD
, pp. 551-562
-
-
Rizvi, S.1
-
18
-
-
53949088244
-
Generating network-based moving objects
-
T. Brinkhoff, "Generating network-based moving objects, " in SSDBM, 2000, p. 253.
-
(2000)
SSDBM
, pp. 253
-
-
Brinkhoff, T.1
-
19
-
-
29844448364
-
Efficient execution of sliding-window queries over streams
-
M. Hammad et. al., "Efficient execution of sliding-window queries over streams." Purdue University, Tech. Rep., 2003.
-
(2003)
Purdue University, Tech. Rep.
-
-
Hammad, M.1
-
20
-
-
33645424689
-
Applying punctuation schemes to queries over data streams
-
P.Tucker et al., "Applying punctuation schemes to queries over data streams." IEEE Data Eng. Bull., vol. 26, no. 1, 2003.
-
(2003)
IEEE Data Eng. Bull.
, vol.26
, Issue.1
-
-
Tucker, P.1
-
21
-
-
21144438447
-
Joining punctuated streams
-
L. Ding, N. Mehta, E. A. Rundensteiner, and G. T. Heineman, "Joining punctuated streams, " in EDBT, 2004, pp. 587-604.
-
(2004)
EDBT
, pp. 587-604
-
-
Ding, L.1
Mehta, N.2
Rundensteiner, E.A.3
Heineman, G.T.4
-
22
-
-
18744399033
-
Evaluating window joins over punctuated streams
-
L. Ding and E. A. Rundensteiner, "Evaluating window joins over punctuated streams, " in CIKM, 2004, pp. 98-107.
-
(2004)
CIKM
, pp. 98-107
-
-
Ding, L.1
Rundensteiner, E.A.2
-
23
-
-
34547990984
-
Safety guarantee of continuous join queries over punctuated data streams
-
H. Li et al., "Safety guarantee of continuous join queries over punctuated data streams, " in VLDB, 2006, pp. 19-30.
-
(2006)
VLDB
, pp. 19-30
-
-
Li, H.1
-
24
-
-
0242674432
-
Hippocratic databases
-
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, "Hippocratic databases, " in VLDB, 2002, pp. 143-154.
-
(2002)
VLDB
, pp. 143-154
-
-
Agrawal, R.1
Kiernan, J.2
Srikant, R.3
Xu, Y.4
-
25
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
J. Park and R. Sandhu, "Towards usage control models: beyond traditional access control, " in SACMAT, 2002, pp. 57-64.
-
(2002)
SACMAT
, pp. 57-64
-
-
Park, J.1
Sandhu, R.2
-
26
-
-
3142523603
-
The UCON-ABC usage control model
-
J. Park et al., "The UCON-ABC usage control model, " ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
-
27
-
-
77955203039
-
A framework to enforce access control over data streams
-
B. Carminati et al., "A framework to enforce access control over data streams, " ACM Trans. Inf. Syst. Secur., vol. 13, no. 3, 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
-
-
Carminati, B.1
-
28
-
-
84945150402
-
Spl: An access control language for security policies with complex constraints
-
C. Ribeiro et al., "Spl: An access control language for security policies with complex constraints, " in NDSSS, 2001.
-
(2001)
NDSSS
-
-
Ribeiro, C.1
-
29
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti et al., "An algebra for composing access control policies, " ACM TISSEC, vol. 5, no. 1, pp. 1-35, 2002.
-
(2002)
ACM TISSEC
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
-
30
-
-
35048869391
-
An algebra for composing enterprise privacy policies
-
M. Backes et al., "An algebra for composing enterprise privacy policies, " in Res. Report 3557, IBM Research, 2004.
-
(2004)
Res. Report 3557, IBM Research
-
-
Backes, M.1
-
31
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E.Bertino et al., "TRBAC: A temporal role-based access control model, " ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
-
32
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
M. Damiani et al., "GEO-RBAC: A spatially aware RBAC, " ACM TISSEC, vol. 10, no. 1, 2007.
-
(2007)
ACM TISSEC
, vol.10
, Issue.1
-
-
Damiani, M.1
-
33
-
-
15944413918
-
Context sensitivity in role-based access control
-
A. Kumar, N. Karnik, and G. Chafle, "Context sensitivity in role-based access control, " SIGOPS Oper. Syst. Rev., vol. 36, no. 3, pp. 53-66, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
36
-
-
57349199277
-
Xengine: A fast and scalable XACML policy evaluation engine
-
A. X. Liu et al., "Xengine: a fast and scalable XACML policy evaluation engine, " in SIGMETRICS, 2008.
-
(2008)
SIGMETRICS
-
-
Liu, A.X.1
|