-
1
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA
-
Hacigumus, H., Iyer, B., Mehrotra, S., Li, C.: Executing SQL over encrypted data in the database-service-provider model. In: Proc. of the ACM SIGMOD 2002, Madison, Wisconsin, USA (2002)
-
(2002)
Proc. of the ACM SIGMOD 2002
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
2
-
-
0036204131
-
Providing database as a service
-
San Jose, California, USA
-
Hacigumus, H., Iyer, B., Mehrotra, S.: Providing database as a service. In: Proc. of 18th International Conference on Data Engineering, San Jose, California, USA (2002)
-
(2002)
Proc. of 18th International Conference on Data Engineering
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
3
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA
-
Damiani, E., De Capitani di Vimercati, S., Jajodia, S., Paraboschi, S., Samarati, P.: Balancing confidentiality and efficiency in untrusted relational DBMSs. In: Proc. of the 10th ACM Conference on Computer and Communications Security (CCS03), Washington, DC, USA (2003)
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security (CCS03)
-
-
Damiani, E.1
De Capitanidi, V.S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
4
-
-
84942812332
-
Protection-principles and practice
-
Montvale, NJ, USA
-
Graham, G., Denning, P.: Protection-principles and practice. In: Proc. of the Spring Jt. Computer Conference. Volume 40., Montvale, NJ, USA (1972) 417-429
-
(1972)
Proc. of the Spring Jt. Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.1
Denning, P.2
-
5
-
-
0016984825
-
Protection in operating systems
-
August
-
Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communications of the SCM 19(8) (August 1976) 461-471
-
(1976)
Communications of the SCM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
7
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for multiple access control policies. ACM Transaction on Database Systems 26(2) (June 2001) 214-260
-
(2001)
ACM Transaction on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
9
-
-
0027699087
-
Lattice-based access control models
-
Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11) (1993) 9-19
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
10
-
-
0003400251
-
-
Technical Report MTR-2547, MITRE Corp., Bedford, MA (November
-
Bell, D., La Padula, L.: Secure computer systems: A mathematical model. Technical Report MTR-2547, Vol 2, MITRE Corp., Bedford, MA (November 1973)
-
(1973)
Secure Computer Systems A Mathematical Model
, vol.2
-
-
Bell, D.1
La Padula, L.2
-
11
-
-
0003400251
-
-
Technical Report MTR-2547, MITRE Corp., Bedford, MA (November
-
Bell, D., La Padula, L.: Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol 1, MITRE Corp., Bedford, MA (November 1973)
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.1
La Padula, L.2
-
12
-
-
0003400251
-
-
Technical Report MTR-2547, MITRE Corp., Bedford, MA (April
-
Bell, D., La Padula, L.: Secure computer systems: A refinement of the mathematical model. Technical Report MTR-2547, Vol 3, MITRE Corp., Bedford, MA (April 1974)
-
(1974)
Secure Computer Systems: A Refinement of the Mathematical Model
, vol.3
-
-
Bell, D.1
La Padula, L.2
-
13
-
-
0003400251
-
-
Technical Report MTR-2997, MITRE Corp., Bedford, MA (July
-
Bell, D., La Padula, L.: Secure computer systems: Unified exposition and multics interpretation. Technical Report MTR-2997, Vol 4, MITRE Corp., Bedford, MA (July 1975)
-
(1975)
Secure Computer Systems: Unified Exposition and Multics Interpretation
, vol.4
-
-
Bell, D.1
La Padula, L.2
-
15
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
In Focardi, R., Gorrieri, R., eds.: Springer-Verlag
-
Samarati, P., De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. In Focardi, R., Gorrieri, R., eds.: Foundations of Security Analysis and Design. LNCS 2171. Springer-Verlag (2001)
-
(2001)
Foundations of Security Analysis and Design. LNCS 2171
-
-
Samarati, P.1
De Capitanidi, V.S.2
-
18
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2) (1996) 38-47
-
(1996)
IEEE Compute
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
20
-
-
0002923966
-
Decentralized trust management
-
Oakland, California, USA May
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. of the 17th Symposium on Security and Privacy, Oakland, California, USA (May 1996)
-
(1996)
Proc. of the 17th Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
21
-
-
0003226048
-
The keynote trust management system (version 2)
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust Management System (Version 2). Internet RFC 2704 edn. (1999)
-
(1999)
Internet RFC 2704 Edn.
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
22
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the web. Journal of Computer Security 10(3)(2002) 241-272
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
23
-
-
33745772562
-
Preventing attribute information leakage in automated trust negotiation
-
Alexandria, VA, USA
-
Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust negotiation. In: Proc. of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA (2005)
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security
-
-
Irwin, K.1
Yu, T.2
-
24
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
Li, N., Mitchell, J., Winsborough, W.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52 (2005) 474-514
-
(2005)
Journal of the AC
, vol.52
, pp. 474-514
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
25
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Alexandria, VA, USA
-
Ni, J., Li, N., Winsborough, W.: Automated trust negotiation using cryptographic credentials. In: Proc. of the 12th ACM Conference on Computer and Communications Security, Alexandria, VA, USA (2005)
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security
-
-
Ni, J.1
Li, N.2
Winsborough, W.3
-
26
-
-
1642327001
-
Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
-
February
-
Yu, T., Winslett, M., Seamons, K.: Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust. ACM Transactions on Information and System Security (TISSEC) 6(1) (February 2003) 1-42
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
-
27
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium (Jul
-
Seamons, K.E., Winsborough, W., Winslett, M.: Internet credential acceptance policies. In: Proc. of the Workshop on Logic Programming for Internet Applications, Leuven, Belgium (July 1997)
-
(1997)
Proc. of the Workshop on Logic Programming for Internet Applications
-
-
Seamons, K.E.1
Winsborough, W.2
Winslett, M.3
-
28
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
Monterey, CA (Jun
-
Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA (June 2002)
-
(2002)
Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
29
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the web: Client and server security policies
-
Washington, DC (May
-
Winslett, M., Ching, N., Jones, V., Slepchin, I.: Assuring security and privacy for digital library transactions on the web: Client and server security policies. In: Proc. of the ADL '97 -Forum on Research and Tech. Advances in Digital Libraries, Washington, DC (May 1997)
-
(1997)
Proc. of the ADL '97 -Forum on Research and Tech. Advances in Digital Libraries
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
30
-
-
0034449542
-
An efficient complete strategy for automated trust negotiation over the internet
-
Athens, Greece (November
-
Yu, T., Ma, X., Winslett, M.: An efficient complete strategy for automated trust negotiation over the internet. In: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece (November 2000)
-
(2000)
Proc. of the 7th ACM Computer and Communication Security
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
31
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA (April
-
Seamons, K., Winslett, M., Yu, T.: Limiting the disclosure of access control policies during automated trust negotiation. In: Proc. of the Symposium on Network and Distributed System Security, San Diego, CA (April 2001)
-
(2001)
Proc. of the Symposium on Network and Distributed System Security
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
32
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Philadelphia, Pennsylvania (November
-
Yu, T., Winslett, M., Seamons, K.: Interoperable strategies in automated trust negotiation. In: Proc. of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania (November 2001)
-
(2001)
Proc. of the 8th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
-
33
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
Berkeley, California (May
-
Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, California (May 2003)
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
34
-
-
30644473909
-
Adaptive trust negotiation and access control
-
Stockholm, Sweden (June
-
Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.: Adaptive trust negotiation and access control. In: Proc. of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden (June 2005)
-
(2005)
Proc. of the 10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
35
-
-
0342706735
-
-
Gladman, B., Ellison, C., Bohm, N.: Digital signatures, certificates and electronic commerce. http://www.clark.net/pub/cme/html/spki.html.
-
Digital Signatures, Certificates and Electronic Commerce
-
-
Gladman, B.1
Ellison, C.2
Bohm, N.3
-
36
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Transactions on Information and System Security 5(1) (February 2002) 1-35
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitanidi, V.S.2
Samarati, P.3
-
39
-
-
84983002492
-
Access control in configurable systems
-
Jaeger, T.: Access control in configurable systems. Lecture Notes in Computer Science 1603 (2001) 289-316
-
(2001)
Lecture Notes in Computer Science
, vol.1603
, pp. 289-316
-
-
Jaeger, T.1
-
42
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
April
-
Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems 17(2) (April 1999) 101-140
-
(1999)
ACM Transactions on Information Systems
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
43
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for multiple access control policies. ACM Transactions on Database Systems 26(2) (June 2001) 214-260
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
44
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
Tucson, AZ (May
-
Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Proc. of the 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ (May 1997)
-
(1997)
Proc. of the 1997 ACM International SIGMOD Conference on Management of Data
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
Bertino, E.4
-
45
-
-
0000393542
-
A logic-based knowledge representation for authorization with delegation
-
Washington, DC, USA (July
-
Li, N., Feigenbaum, J., Grosof, B.: A logic-based knowledge representation for authorization with delegation. In: Proc. of the 12th IEEE Computer Security Foundations Workshop, Washington, DC, USA (July 1999)
-
(1999)
Proc. of the 12th IEEE Computer Security Foundations Workshop
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.3
-
46
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
Woo, T., Lam, S.: Authorizations in distributed systems: A new approach. Journal of Computer Security 2(2,3) (1993) 107-136
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
-
48
-
-
36248981396
-
An experimental evaluation of multi-key strategies for data outsourcing
-
Sandton, South Africa (May
-
Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: An experimental evaluation of multi-key strategies for data outsourcing. In: Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007), Sandton, South Africa (May 2007)
-
(2007)
Proc. of the 22nd IFIP TC-11 International Information Security Conference (SEC 2007)
-
-
Damiani, E.1
De Capitanidi, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
50
-
-
85009120801
-
Controlling access to published data using cryptography
-
Berlin, Germany (September
-
Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: Proc. of the 29th VLDB Conference, Berlin, Germany (September 2003)
-
(2003)
Proc. of the 29th VLDB Conference
-
-
Miklau, G.1
Suciu, D.2
-
51
-
-
33947630349
-
On key assignment for hierarchical access control
-
Los Alamitos, CA, USA
-
Crampton, J., Martin, K., Wild, P.: On key assignment for hierarchical access control. In: In Proc. of the 19th IEEE Computer Security FoundationsWorkshop (CSFW'06), Los Alamitos, CA, USA (2006)
-
(2006)
Proc. of the 19th IEEE Computer Security FoundationsWorkshop (CSFW'06)
-
-
Crampton, J.1
Martin, K.2
Wild, P.3
-
53
-
-
0019057051
-
The design of a cryptography based secure file system
-
Gudes, E.: The design of a cryptography based secure file system. IEEE Transactions on Software Engineering 6 (1980) 411-420
-
(1980)
IEEE Transactions on Software Engineering
, vol.6
, pp. 411-420
-
-
Gudes, E.1
-
54
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu, R.: Cryptographic implementation of a tree hierarchy for access control. Information Processing Letters 27 (1988) 95-98
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.1
-
55
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Alexandria, VA, USA
-
Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Proc. of the 12th ACM conference on Computer and Communications Security (CCS05), Alexandria, VA, USA (2005)
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security (CCS05
-
-
Atallah, M.1
Frikken, K.2
Blanton, M.3
-
56
-
-
33846573849
-
Selective data encryption in outsourced dynamic environments
-
Bertinoro, Italy, Elsevier
-
Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Selective data encryption in outsourced dynamic environments. In: Proc. of the Second International Workshop on Views On Designing Complex Architectures (VODCA 2006). Electronic Notes in Theoretical Computer Science, Bertinoro, Italy, Elsevier (2006)
-
(2006)
Proc. of the Second International Workshop on Views on Designing Complex Architectures (VODCA 2006). Electronic Notes in Theoretical Computer Science
-
-
Damiani, E.1
De Capitanidi, V.S.2
Foresti, S.3
Jajodia, S.4
Paraboschi, S.5
Samarati, P.6
-
57
-
-
84893821498
-
Efficient secure query evaluation over encrypted XML databases
-
Seoul, Korea (September)
-
Wang, H., Lakshmanan, L.V.S.: Efficient secure query evaluation over encrypted XML databases. In: Proc. of the 32nd VLDB Conference, Seoul, Korea (September 2006)
-
(2006)
Proc. of the 32nd VLDB Conference
-
-
Wang, H.1
Lakshmanan, L.V.S.2
|