메뉴 건너뛰기




Volumn , Issue , 2015, Pages 37-46

Applying hierarchical and role based access control to XML documents

Author keywords

Encryption; Hierarchical access control; Role based access control; XML

Indexed keywords

CRYPTOGRAPHY; WEB SERVICES; WEBSITES; XML;

EID: 84954147732     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1111348.1111353     Document Type: Conference Paper
Times cited : (18)

References (25)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • Akl, S., and Taylor, P. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1, 3 (1983), 239-248.
    • (1983) ACM Transactions on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 0035330891 scopus 로고    scopus 로고
    • Author-X: A comprehensive system for securing XML documents
    • Bertino, E., Castano, S., and Ferrari, E. Author-X: A comprehensive system for securing XML documents. IEEE Internet Computing 5, 3 (2001), 21-31.
    • (2001) IEEE Internet Computing , vol.5 , Issue.3 , pp. 21-31
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 6
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • Harn, L., and Lin, H. A cryptographic key generation scheme for multilevel data security. Computers and Security 9, 6 (1990), 539-546.
    • (1990) Computers and Security , vol.9 , Issue.6 , pp. 539-546
    • Harn, L.1    Lin, H.2
  • 9
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
    • MacKinnon, S., Taylor, P., Meijer, H., and Akl, S. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers C-34, 9 (1985), 797-802.
    • (1985) IEEE Transactions on Computers C-34 , vol.9 , pp. 797-802
    • MacKinnon, S.1    Taylor, P.2    Meijer, H.3    Akl, S.4
  • 11
    • 4243187063 scopus 로고    scopus 로고
    • Containment and equivalence for a fragment of XPath
    • Miklau, G., and Suciu, D. Containment and equivalence for a fragment of XPath. Journal of the ACM 51, 1 (2004), 2-45.
    • (2004) Journal of the ACM , vol.51 , Issue.1 , pp. 2-45
    • Miklau, G.1    Suciu, D.2
  • 17
    • 0036187601 scopus 로고    scopus 로고
    • A time-bound cryptographic key assignment scheme for access control in a hierarchy
    • Tzeng, W.-G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 14, 1 (2002), 182-188.
    • (2002) IEEE Transactions on Knowledge and Data Engineering , vol.14 , Issue.1 , pp. 182-188
    • Tzeng, W.-G.1
  • 18
    • 0000150571 scopus 로고    scopus 로고
    • A formal semantics of patterns in XSLT and XPath
    • Wadler, P. A formal semantics of patterns in XSLT and XPath. Markup Languages: Theory and Practice 2, 2 (2000), 183-202.
    • (2000) Markup Languages: Theory and Practice , vol.2 , Issue.2 , pp. 183-202
    • Wadler, P.1
  • 25
    • 0041347682 scopus 로고    scopus 로고
    • Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    • Yi, X., and Ye, Y. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 15, 4 (2003), 1054-1055.
    • (2003) IEEE Transactions on Knowledge and Data Engineering , vol.15 , Issue.4 , pp. 1054-1055
    • Yi, X.1    Ye, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.