-
1
-
-
84904327756
-
-
https://github.com/JSQLParser/JSqlParser.
-
-
-
-
2
-
-
84888998912
-
-
Android permissions. http://developer.android.com/guide/topics/security/ permissions.html.
-
Android Permissions
-
-
-
5
-
-
84904283477
-
-
Label-based access control (lbac) overview. http://publib.boulder.ibm. com/infocenter/db2luw/v9/index.jsp?topic=%2Fcom.ibm.db2.udb. admin.doc%2Fdoc%2Fc0021114.htm.
-
Label-based Access Control (Lbac) Overview
-
-
-
6
-
-
84904369191
-
-
Virtual private database. http://www.oracle.com/technetwork/database/ security/index-088277.html.
-
Virtual Private Database
-
-
-
7
-
-
84962460473
-
Secpal: Design and semantics of a decentralized authorization language
-
Moritz Y Becker, Cédric Fournet, and Andrew D Gordon. Secpal: Design and semantics of a decentralized authorization language. CSF, 2006.
-
(2006)
CSF
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
8
-
-
84880566531
-
Fine-grained disclosure control for app ecosystems
-
Gabriel M Bender, Lucja Kot, Johannes Gehrke, and Christoph Koch. Fine-grained disclosure control for app ecosystems. SIGMOD, 2013.
-
(2013)
SIGMOD
-
-
Bender, G.M.1
Kot, L.2
Gehrke, J.3
Koch, C.4
-
10
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
Alexander Brodsky, Csilla Farkas, and Sushil Jajodia. Secure databases: Constraints, inference channels, and monitoring disclosures. TKDE, 12(6):900-919, 2000.
-
(2000)
TKDE
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
11
-
-
84958776545
-
Optimal implementation of conjunctive queries in relational data bases
-
Ashok K Chandra and Philip M Merlin. Optimal implementation of conjunctive queries in relational data bases. STOC, 1977.
-
(1977)
STOC
-
-
Chandra, A.K.1
Merlin, P.M.2
-
12
-
-
34548810781
-
Fine grained authorization through predicated grants
-
Surajit Chaudhuri, Tanmoy Dutta, and S Sudarshan. Fine grained authorization through predicated grants. ICDE, 2007.
-
(2007)
ICDE
-
-
Chaudhuri, S.1
Dutta, T.2
Sudarshan, S.3
-
13
-
-
0027885003
-
Optimization of real conjunctive queries
-
Surajit Chaudhuri and Moshe Y Vardi. Optimization of real conjunctive queries. SIGMOD, 1993.
-
(1993)
SIGMOD
-
-
Chaudhuri, S.1
Vardi, M.Y.2
-
14
-
-
67649565844
-
Equivalence of queries that are sensitive to multiplicities
-
Sara Cohen. Equivalence of queries that are sensitive to multiplicities. VLDB, 2009.
-
(2009)
VLDB
-
-
Cohen, S.1
-
16
-
-
80755187788
-
Android permissions demystified
-
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner. Android permissions demystified. CCS, 2011.
-
(2011)
CCS
-
-
Porter Felt, A.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
17
-
-
84862603356
-
Query-based data pricing
-
Paraschos Koutris, Prasang Upadhyaya, Magdalena Balazinska, Bill Howe, and Dan Suciu. Query-based data pricing. PODS, 2012.
-
(2012)
PODS
-
-
Koutris, P.1
Upadhyaya, P.2
Balazinska, M.3
Howe, B.4
Suciu, D.5
-
18
-
-
85019665607
-
A lattice of information
-
Jaisook Landauer and Timothy Redmond. A lattice of information. CSFW, 1993.
-
(1993)
CSFW
-
-
Landauer, J.1
Redmond, T.2
-
19
-
-
77955211754
-
Views and queries: Determinacy and rewriting
-
Alan Nash, Luc Segoufin, and Victor Vianu. Views and queries: Determinacy and rewriting. TODS, 2010.
-
(2010)
TODS
-
-
Nash, A.1
Segoufin, L.2
Vianu, V.3
-
20
-
-
69949149767
-
A formal framework for reective database access control policies
-
Lars E Olson, Carl A Gunter, and P Madhusudan. A formal framework for reective database access control policies. CCS, 2008.
-
(2008)
CCS
-
-
Olson, L.E.1
Gunter, C.A.2
Madhusudan, P.3
-
21
-
-
0003584326
-
-
McGraw-Hill, Inc., New York, NY, USA, 3 edition
-
Raghu Ramakrishnan and Johannes Gehrke. Database Management Systems. McGraw-Hill, Inc., New York, NY, USA, 3 edition, 2003.
-
(2003)
Database Management Systems
-
-
Ramakrishnan, R.1
Gehrke, J.2
-
22
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
Shariq Rizvi, Alberto Mendelzon, Sundararajarao Sudarshan, and Prasan Roy. Extending query rewriting techniques for fine-grained access control. SIGMOD, 2004.
-
(2004)
SIGMOD
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
23
-
-
0016555241
-
The protection of information in computer systems
-
Jerome H Saltzer and Michael D Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
24
-
-
79959832939
-
Nexus authorization logic (nal): Design rationale and applications
-
Fred B Schneider, Kevin Walsh, and Emin Gün Sirer. Nexus authorization logic (nal): Design rationale and applications. TISSEC, 14(1), 2011.
-
(2011)
TISSEC
, vol.14
, Issue.1
-
-
Schneider, F.B.1
Walsh, K.2
Sirer, E.G.3
|