메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-26

Recent advances in access control

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84886308792     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1007/978-0-387-48533-1_1     Document Type: Chapter
Times cited : (22)

References (57)
  • 1
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin, USA
    • Hacigumus, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the ACM SIGMOD 2002, Madison, Wisconsin, USA (2002)
    • (2002) Proc. of the ACM SIGMOD 2002
    • Hacigumus, H.1    Iyer, B.2    Mehrotra, S.3    Li, C.4
  • 9
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11) (1993) 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 22
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security 10(3)(2002) 241-272
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 24
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • Li, N., Mitchell, J., Winsborough, W.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52 (2005) 474-514
    • (2005) Journal of the AC , vol.52 , pp. 474-514
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 26
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
    • February
    • Yu, T., Winslett, M., Seamons, K.: Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust. ACM Transactions on Information and System Security (TISSEC) 6(1) (February 2003) 1-42
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.3
  • 30
    • 0034449542 scopus 로고    scopus 로고
    • An efficient complete strategy for automated trust negotiation over the internet
    • Athens, Greece (November
    • Yu, T., Ma, X., Winslett, M.: An efficient complete strategy for automated trust negotiation over the internet. In: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece (November 2000)
    • (2000) Proc. of the 7th ACM Computer and Communication Security
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 33
    • 84954418287 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Berkeley, California (May
    • Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, California (May 2003)
    • (2003) Proc. of the IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 39
    • 84983002492 scopus 로고    scopus 로고
    • Access control in configurable systems
    • Jaeger, T.: Access control in configurable systems. Lecture Notes in Computer Science 1603 (2001) 289-316
    • (2001) Lecture Notes in Computer Science , vol.1603 , pp. 289-316
    • Jaeger, T.1
  • 42
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • April
    • Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems 17(2) (April 1999) 101-140
    • (1999) ACM Transactions on Information Systems , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 46
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • Woo, T., Lam, S.: Authorizations in distributed systems: A new approach. Journal of Computer Security 2(2,3) (1993) 107-136
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2
  • 50
    • 85009120801 scopus 로고    scopus 로고
    • Controlling access to published data using cryptography
    • Berlin, Germany (September
    • Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of the 29th VLDB Conference, Berlin, Germany (September 2003)
    • (2003) Proc. of the 29th VLDB Conference
    • Miklau, G.1    Suciu, D.2
  • 53
    • 0019057051 scopus 로고
    • The design of a cryptography based secure file system
    • Gudes, E.: The design of a cryptography based secure file system. IEEE Transactions on Software Engineering 6 (1980) 411-420
    • (1980) IEEE Transactions on Software Engineering , vol.6 , pp. 411-420
    • Gudes, E.1
  • 54
    • 0023962708 scopus 로고
    • Cryptographic implementation of a tree hierarchy for access control
    • Sandhu, R.: Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27 (1988) 95-98
    • (1988) Information Processing Letters , vol.27 , pp. 95-98
    • Sandhu, R.1
  • 57
    • 84893821498 scopus 로고    scopus 로고
    • Efficient secure query evaluation over encrypted XML databases
    • Seoul, Korea (September)
    • Wang, H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of the 32nd VLDB Conference, Seoul, Korea (September 2006)
    • (2006) Proc. of the 32nd VLDB Conference
    • Wang, H.1    Lakshmanan, L.V.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.