-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept.
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst., 15(4):706-734, Sept. 1993.
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
80053479013
-
Consistency analysis in bloom: A calm and collected approach
-
P. Alvaro, N. Conway, J. Hellerstein, and W. R. Marczak. Consistency analysis in bloom: a calm and collected approach. In CIDR, pages 249-260, 2011.
-
(2011)
CIDR
, pp. 249-260
-
-
Alvaro, P.1
Conway, N.2
Hellerstein, J.3
Marczak, W.R.4
-
6
-
-
77954636932
-
-
Technical, EECS Department, University of California, Berkeley, December
-
P. Alvaro, W. R. Marczak, N. Conway, J. M. Hellerstein, D. Maier, and R. C. Sears. Dedalus: Datalog in Time and Space. Technical Report UCB/EECS-2009-173, EECS Department, University of California, Berkeley, December 2009.
-
(2009)
Dedalus: Datalog in Time and Space
-
-
Alvaro, P.1
Marczak, W.R.2
Conway, N.3
Hellerstein, J.M.4
Maier, D.5
Sears, R.C.6
-
10
-
-
70450255117
-
A semantic web based framework for social network access control
-
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. A semantic web based framework for social network access control. In Symposium on Access Control Models and Technologies (SACMAT), pages 177-186, 2009.
-
(2009)
Symposium on Access Control Models and Technologies (SACMAT)
, pp. 177-186
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
11
-
-
79951679488
-
Semantic web-based social network access control
-
B. Carminati, E. Ferrari, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. Semantic web-based social network access control. Computers & security, 30(2):108-115, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.2
, pp. 108-115
-
-
Carminati, B.1
Ferrari, E.2
Heatherly, R.3
Kantarcioglu, M.4
Thuraisingham, B.5
-
12
-
-
84873637026
-
Relationship-based access control for online social networks: Beyond user-to-user relationships
-
IEEE
-
Y. Cheng, J. Park, and R. Sandhu. Relationship-based access control for online social networks: Beyond user-to-user relationships. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), pages 646-655. IEEE, 2012.
-
(2012)
Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)
, pp. 646-655
-
-
Cheng, Y.1
Park, J.2
Sandhu, R.3
-
15
-
-
84878326313
-
Multiparty access control for online social networks: Model and mechanisms
-
H. Hu, G.-J. Ahn, and J. Jorgensen. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7):1614-1627, 2013.
-
(2013)
Knowledge and Data Engineering, IEEE Transactions On
, vol.25
, Issue.7
, pp. 1614-1627
-
-
Hu, H.1
Ahn, G.-J.2
Jorgensen, J.3
-
16
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
VLDB Endowment
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. DeWitt. Limiting disclosure in hippocratic databases. In VLDB '04: Proceedings of the Thirtieth international conference on Very large data bases, pages 108-119. VLDB Endowment, 2004.
-
(2004)
VLDB '04: Proceedings of the Thirtieth International Conference on Very Large Data Bases
, pp. 108-119
-
-
LeFevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.6
-
19
-
-
84868256261
-
A provenance-based access control model
-
J. Park, D. Nguyen, and R. Sandhu. A provenance-based access control model. In Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on, pages 137-144, 2012.
-
(2012)
Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference On
, pp. 137-144
-
-
Park, J.1
Nguyen, D.2
Sandhu, R.3
-
21
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In Conference on Management of Data (SIGMOD), pages 551-562, 2004.
-
(2004)
Conference on Management of Data (SIGMOD)
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
22
-
-
84870302029
-
Access control for online social networks third party applications
-
M. Shehab, A. Squicciarini, G.-J. Ahn, and I. Kokkinou. Access control for online social networks third party applications. computers & security, 31(8):897-911, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.8
, pp. 897-911
-
-
Shehab, M.1
Squicciarini, A.2
Ahn, G.-J.3
Kokkinou, I.4
-
23
-
-
85011022992
-
On the correctness criteria of fine-grained access control in relational databases
-
Q. Wang, T. Yu, N. Li, J. Lobo, E. Bertino, K. Irwin, and J.-W. Byun. On the correctness criteria of fine-grained access control in relational databases. In Conference on Very Large Data Bases, pages 555-566, 2007.
-
(2007)
Conference on Very Large Data Bases
, pp. 555-566
-
-
Wang, Q.1
Yu, T.2
Li, N.3
Lobo, J.4
Bertino, E.5
Irwin, K.6
Byun, J.-W.7
|