-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
Adam, N., Atlubi, V., Bertino, E., and Ferrari, E. 2002. A content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14, 2, 296-315.
-
(2002)
IEEE Trans. Knowl. Data Eng.
, vol.14
, Issue.2
, pp. 296-315
-
-
Adam, N.1
Atlubi, V.2
Bertino, E.3
Ferrari, E.4
-
2
-
-
35048827553
-
Selective and Authentic Third-Party Distribution of Xml Documents
-
Bertino, E., Carminati, B., Ferrari, E., Thuraisingam, B., and Gupta, A. 2002. Selective and Authentic Third-Party Distribution of Xml Documents. Mit Sloan Working Paper No. 4343-4402.
-
(2002)
Mit Sloan Working Paper No
, pp. 4343-4402
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
Thuraisingam, B.4
Gupta, A.5
-
3
-
-
0035330891
-
Author-X: A comprehensive system for securing XML documents
-
Bertino, E., Castano, S., and Ferrari, E. 2001a. Author-X: A comprehensive system for securing XML documents. IEEE Internet Comput. 5, 3, 21-31.
-
(2001)
IEEE Internet Comput.
, vol.5
, Issue.3
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
SACMAT'01) (Chantilly, Va.). ACM, New York
-
Bertino, E., Castano, S., and Ferrari, E. 2001b. On specifying security policies for web documents with an XML-based language. In Proceedings of the 1st ACM Symposium on Access Control Models and Technologies (SACMAT'01) (Chantilly, Va.). ACM, New York.
-
(2001)
Proceedings of the 1st ACM Symposium on Access Control Models and Technologies
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
5
-
-
85134887303
-
Specifying and enforcing access control policies for XML document sources
-
Bertino, E., Castano, S., Ferrari, E., andMesiti, M. 2001c. Specifying and enforcing access control policies for XML document sources. WWW J. 3, 3, 139-151.
-
(2001)
WWW J.
, vol.3
, Issue.3
, pp. 139-151
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
andMesiti, M.4
-
6
-
-
85024242456
-
Secure and Selective Dissemination of Xml Documents
-
Department of Computer Science, University of Milano (Extended Version of This Article.)
-
Bertino, E., and Ferrari, E. 2000. Secure and Selective Dissemination of Xml Documents. Technical Report, Department of Computer Science, University of Milano (Extended Version of This Article.).
-
(2000)
Technical Report
-
-
Bertino, E.1
Ferrari, E.2
-
7
-
-
85024257089
-
Access Control Policy Management For Xml Documents
-
Department of Computer Science, University of Milano, Milano, Italy, Submitted For Publication
-
Carminati, E. and Ferrari, E. 2002. Access Control Policy Management For Xml Documents. Tech. Rep. Department of Computer Science, University of Milano, Milano, Italy, Submitted For Publication.
-
(2002)
Tech. Rep.
-
-
Carminati, E.1
Ferrari, E.2
-
8
-
-
84937420536
-
Securing Xml Documents
-
(Konstanz, Germany)
-
Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., and Samabati, P. 2000. Securing Xml Documents. In Proceedings of the 6Th International Conference on Extending Database Technology (Konstanz, Germany), Pp. 121-135.
-
(2000)
Proceedings of the 6Th International Conference on Extending Database Technology
, pp. 121-135
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samabati, P.4
-
9
-
-
35048844743
-
Securing Xml Documents
-
Available At: http://www.Research.Att.Com/Suciu
-
Deutsch, A., Fernandez, M., Florescu, D., Levy, A., and Suciu, D. 1999. Securing Xml Documents. In Proceedings of the International Conference on World Wide Web, Available At: http://www.Research.Att.Com/Suciu.
-
(1999)
Proceedings of the International Conference on World Wide Web
-
-
Deutsch, A.1
Fernandez, M.2
Florescu, D.3
Levy, A.4
Suciu, D.5
-
10
-
-
0028404874
-
A Model For Evaluation and Administration of Security in Object-Oriented Databases
-
Fernandez, E., Gudes, E., and Song, H. 1994. A Model For Evaluation and Administration of Security in Object-Oriented Databases. Ieee Trans. Knowl. Data Eng. 6, 275-292.
-
(1994)
Ieee Trans. Knowl. Data Eng.
, vol.6
, pp. 275-292
-
-
Fernandez, E.1
Gudes, E.2
Song, H.3
-
11
-
-
0003225767
-
Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality
-
Gladney, H. and Lotspiech, J. 1997. Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality. D-Lib Mag.
-
(1997)
D-Lib Mag.
-
-
Gladney, H.1
Lotspiech, J.2
-
15
-
-
84867365927
-
-
http://www.Oasis-Open.Org.
-
Oasis Consortium. http://www.Oasis-Open.Org.
-
Oasis Consortium
-
-
-
17
-
-
0026119329
-
A Model of Authorization For Next-Generation Database Systems
-
Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A Model of Authorization For Next-Generation Database Systems. Acm Trans. Datab. Syst. 16, 1, 88-131.
-
(1991)
Acm Trans. Datab. Syst.
, vol.16
, Issue.1
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
18
-
-
0030216932
-
An Authorization Model For A Distributed Hypertext System
-
Samarati, P., Bertino, E., and Jajodia, S. 1996. An Authorization Model For A Distributed Hypertext System. Ieee Trans. Knowl. Data Eng. 8, 4, 555-562.
-
(1996)
Ieee Trans. Knowl. Data Eng.
, vol.8
, Issue.4
, pp. 555-562
-
-
Samarati, P.1
Bertino, E.2
Jajodia, S.3
-
19
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-Based Access Control Models. Ieee Comput. 29, 2, 38-47.
-
(1996)
Ieee Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
20
-
-
0003507850
-
Network Security Essentials: Applications and Standars
-
Prentice-Hall, Englewood Cliffs, N.J.
-
Stallings, W. 2000. Network Security Essentials: Applications and Standars. Prentice-Hall, Englewood Cliffs, N.J.
-
(2000)
-
-
Stallings, W.1
-
21
-
-
85024256949
-
Directories: Managing Data For Networked Applications. Tutorial Presented
-
(San Diego, Calif.). Ieee, Computer Society Press, Los Alamitos, Calif
-
Srivastava, D. 2000. Directories: Managing Data For Networked Applications. Tutorial Presented At the 16Th Ieee International Conference on Database Engineering (Icde'00) (San Diego, Calif.). Ieee, Computer Society Press, Los Alamitos, Calif.
-
(2000)
16Th Ieee International Conference on Database Engineering (Icde'00)
-
-
Srivastava, D.1
-
22
-
-
0010047050
-
Secure Computing: Threats and Safeguards
-
Mcgraw-Hill, New York
-
Summers, R. C. 1997. Secure Computing: Threats and Safeguards. Mcgraw-Hill, New York.
-
(1997)
-
-
Summers, R.C.1
-
23
-
-
0031338080
-
Using Digital Credentials on the World Wide Web
-
Winslett, M., Ching, N., Jones, V., and Slepchin, I. 1997. Using Digital Credentials on the World Wide Web. J. Comput. Secu. 7.
-
(1997)
J. Comput. Secu.
, vol.7
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
24
-
-
0003551091
-
-
Available At: http://www.W3.Org/Tr/Rec-Xml
-
World Wide Web Consortium 1998. Extensible Markup Language (Xml) 1.0. Available At: http://www.W3.Org/Tr/Rec-Xml.
-
(1998)
Extensible Markup Language (Xml) 1.0.
-
-
-
25
-
-
84875346296
-
Xml Encryption Syntax and Processing
-
Available At: http://hsts.w3.org/archives/public/xml-encryption/2000aug/att-0001/01-xmlencoverview.html
-
World Wide Web Consortium 2000. Xml Encryption Syntax and Processing. Available At: http://hsts.w3.org/archives/public/xml-encryption/2000aug/att-0001/01-xmlencoverview.html.
-
(2000)
-
-
|