메뉴 건너뛰기




Volumn , Issue , 2013, Pages 243-254

FENCE: Continuous Access control enforcement in dynamic data stream environments

Author keywords

Access control; Data stream; XACML

Indexed keywords

ACCESS CONTROL ENFORCEMENTS; ACCESS CONTROL POLICIES; CONTINUOUS QUERIES; DATA STREAM; EXPERIMENTAL STUDIES; PERFORMANCE BENEFITS; PROCESSING APPROACH; XACML;

EID: 84874872678     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2435349.2435383     Document Type: Conference Paper
Times cited : (25)

References (36)
  • 1
    • 34250735599 scopus 로고    scopus 로고
    • High-performance complex event processing over streams
    • E. Wu et al., "High-performance complex event processing over streams, " in SIGMOD, 2006, pp. 407-418.
    • (2006) SIGMOD , pp. 407-418
    • Wu, E.1
  • 2
    • 2442617843 scopus 로고    scopus 로고
    • Issues in data stream management
    • L. Golab and M. T. Ozsu, "Issues in data stream management, " SIGMOD Rec., vol. 32, no. 2, pp. 5-14, 2003.
    • (2003) SIGMOD Rec , vol.32 , Issue.2 , pp. 5-14
    • Golab, L.1    Ozsu, M.T.2
  • 3
    • 33745607641 scopus 로고    scopus 로고
    • Nile-PDT: A phenomenon detection and tracking framework for dsmss
    • M. Ali et al., "Nile-PDT: a phenomenon detection and tracking framework for dsmss, " in VLDB, 2005, pp. 1295-1298.
    • (2005) VLDB , pp. 1295-1298
    • Ali, M.1
  • 4
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • [Online], Available: citeseer.ist.psu.edu/sandhu96rolebased.html
    • R. Sandhu et al., "Role-based access control models, " IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996. [Online]. Available: citeseer.ist.psu.edu/sandhu96rolebased.html.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1
  • 8
    • 84874857739 scopus 로고    scopus 로고
    • A comparison of compression techniques for xml-based security policies in mobile computing environments
    • April 27
    • R. Qing and C. Adams, "A comparison of compression techniques for xml-based security policies in mobile computing environments, " in Proceedings of the Workshop on New Challenges for Access Control (NCAC), April 27, 2005, pp. 209-232.
    • (2005) Proceedings of the Workshop on New Challenges for Access Control (NCAC) , pp. 209-232
    • Qing, R.1    Adams, C.2
  • 9
    • 52649140439 scopus 로고    scopus 로고
    • Security punctuation framework for enforcing access control on streaming data
    • R. Nehme et al., "Security punctuation framework for enforcing access control on streaming data, " in ICDE, 2008.
    • (2008) ICDE
    • Nehme, R.1
  • 10
    • 77952763862 scopus 로고    scopus 로고
    • FENCE: Continuous access control enforcement in dynamic data stream environments
    • R. Nehme et al., "FENCE: Continuous Access Control Enforcement in Dynamic Data Stream Environments, " in ICDE, 2010.
    • (2010) ICDE
    • Nehme, R.1
  • 11
    • 18744383467 scopus 로고    scopus 로고
    • Cape: Continuous query engine with heterogeneous-grained adaptivity
    • E. Rundensteiner et al., "Cape: Continuous query engine with heterogeneous-grained adaptivity, " in VLDB, 2004.
    • (2004) VLDB
    • Rundensteiner, E.1
  • 12
    • 84992227458 scopus 로고    scopus 로고
    • Proposed NIST standard for role-based access control
    • D. Ferraiolo et al., "Proposed NIST standard for role-based access control, " ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 224-274, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.1
  • 13
    • 0030732547 scopus 로고    scopus 로고
    • An extended authorization model for relational databases
    • E. Bertino et al., "An extended authorization model for relational databases, " TKDE, vol. 9, no. 1, pp. 85-101, 1997.
    • (1997) TKDE , vol.9 , Issue.1 , pp. 85-101
    • Bertino, E.1
  • 15
    • 3142523600 scopus 로고    scopus 로고
    • A propositional policy algebra for access control
    • D. Wijesekera and S. Jajodia, "A propositional policy algebra for access control, " ACM TISSEC, vol. 6, no. 2, pp. 286-325, 2003.
    • (2003) ACM TISSEC , vol.6 , Issue.2 , pp. 286-325
    • Wijesekera, D.1    Jajodia, S.2
  • 16
    • 3142749878 scopus 로고    scopus 로고
    • Secure XML querying with security views
    • W. Fan, C. Chan, and M. Garofalakis, "Secure XML querying with security views, " in SIGMOD, 2004, pp. 587-598.
    • (2004) SIGMOD , pp. 587-598
    • Fan, W.1    Chan, C.2    Garofalakis, M.3
  • 17
    • 3142702944 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • S. Rizvi et al., "Extending query rewriting techniques for fine-grained access control, " in SIGMOD, 2004, pp. 551-562.
    • (2004) SIGMOD , pp. 551-562
    • Rizvi, S.1
  • 18
    • 53949088244 scopus 로고    scopus 로고
    • Generating network-based moving objects
    • T. Brinkhoff, "Generating network-based moving objects, " in SSDBM, 2000, p. 253.
    • (2000) SSDBM , pp. 253
    • Brinkhoff, T.1
  • 19
    • 29844448364 scopus 로고    scopus 로고
    • Efficient execution of sliding-window queries over streams
    • M. Hammad et. al., "Efficient execution of sliding-window queries over streams." Purdue University, Tech. Rep., 2003.
    • (2003) Purdue University, Tech. Rep.
    • Hammad, M.1
  • 20
    • 33645424689 scopus 로고    scopus 로고
    • Applying punctuation schemes to queries over data streams
    • P.Tucker et al., "Applying punctuation schemes to queries over data streams." IEEE Data Eng. Bull., vol. 26, no. 1, 2003.
    • (2003) IEEE Data Eng. Bull. , vol.26 , Issue.1
    • Tucker, P.1
  • 22
    • 18744399033 scopus 로고    scopus 로고
    • Evaluating window joins over punctuated streams
    • L. Ding and E. A. Rundensteiner, "Evaluating window joins over punctuated streams, " in CIKM, 2004, pp. 98-107.
    • (2004) CIKM , pp. 98-107
    • Ding, L.1    Rundensteiner, E.A.2
  • 23
    • 34547990984 scopus 로고    scopus 로고
    • Safety guarantee of continuous join queries over punctuated data streams
    • H. Li et al., "Safety guarantee of continuous join queries over punctuated data streams, " in VLDB, 2006, pp. 19-30.
    • (2006) VLDB , pp. 19-30
    • Li, H.1
  • 25
    • 0242456750 scopus 로고    scopus 로고
    • Towards usage control models: Beyond traditional access control
    • J. Park and R. Sandhu, "Towards usage control models: beyond traditional access control, " in SACMAT, 2002, pp. 57-64.
    • (2002) SACMAT , pp. 57-64
    • Park, J.1    Sandhu, R.2
  • 26
    • 3142523603 scopus 로고    scopus 로고
    • The UCON-ABC usage control model
    • J. Park et al., "The UCON-ABC usage control model, " ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1
  • 27
    • 77955203039 scopus 로고    scopus 로고
    • A framework to enforce access control over data streams
    • B. Carminati et al., "A framework to enforce access control over data streams, " ACM Trans. Inf. Syst. Secur., vol. 13, no. 3, 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.3
    • Carminati, B.1
  • 28
    • 84945150402 scopus 로고    scopus 로고
    • Spl: An access control language for security policies with complex constraints
    • C. Ribeiro et al., "Spl: An access control language for security policies with complex constraints, " in NDSSS, 2001.
    • (2001) NDSSS
    • Ribeiro, C.1
  • 29
    • 85025424440 scopus 로고    scopus 로고
    • An algebra for composing access control policies
    • P. Bonatti et al., "An algebra for composing access control policies, " ACM TISSEC, vol. 5, no. 1, pp. 1-35, 2002.
    • (2002) ACM TISSEC , vol.5 , Issue.1 , pp. 1-35
    • Bonatti, P.1
  • 30
    • 35048869391 scopus 로고    scopus 로고
    • An algebra for composing enterprise privacy policies
    • M. Backes et al., "An algebra for composing enterprise privacy policies, " in Res. Report 3557, IBM Research, 2004.
    • (2004) Res. Report 3557, IBM Research
    • Backes, M.1
  • 31
    • 84944792110 scopus 로고    scopus 로고
    • TRBAC: A temporal role-based access control model
    • E.Bertino et al., "TRBAC: A temporal role-based access control model, " ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1
  • 32
    • 33847092871 scopus 로고    scopus 로고
    • GEO-RBAC: A spatially aware RBAC
    • M. Damiani et al., "GEO-RBAC: A spatially aware RBAC, " ACM TISSEC, vol. 10, no. 1, 2007.
    • (2007) ACM TISSEC , vol.10 , Issue.1
    • Damiani, M.1
  • 33
    • 15944413918 scopus 로고    scopus 로고
    • Context sensitivity in role-based access control
    • A. Kumar, N. Karnik, and G. Chafle, "Context sensitivity in role-based access control, " SIGOPS Oper. Syst. Rev., vol. 36, no. 3, pp. 53-66, 2002.
    • (2002) SIGOPS Oper. Syst. Rev. , vol.36 , Issue.3 , pp. 53-66
    • Kumar, A.1    Karnik, N.2    Chafle, G.3
  • 36
    • 57349199277 scopus 로고    scopus 로고
    • Xengine: A fast and scalable XACML policy evaluation engine
    • A. X. Liu et al., "Xengine: a fast and scalable XACML policy evaluation engine, " in SIGMETRICS, 2008.
    • (2008) SIGMETRICS
    • Liu, A.X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.