-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S., and Taylor, P. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1, 3 (1983), 239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
2
-
-
0038349273
-
A temporal key management scheme for secure broadcasting of XML documents
-
Bertino, E., Carminati, B., and Ferrari, E. A temporal key management scheme for secure broadcasting of XML documents. In Proceedings of the 8th ACM Conference on Computer and Communications Security (2002), pp. 31-40.
-
(2002)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 31-40
-
-
Bertino, E.1
Carminati, B.2
Ferrari, E.3
-
3
-
-
0035330891
-
Author-X: A comprehensive system for securing XML documents
-
Bertino, E., Castano, S., and Ferrari, E. Author-X: A comprehensive system for securing XML documents. IEEE Internet Computing 5, 3 (2001), 21-31.
-
(2001)
IEEE Internet Computing
, vol.5
, Issue.3
, pp. 21-31
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. A fine-grained access control system for XML documents. ACM Transactions on Information and System Security 5, 2 (2002), 169-202.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
5
-
-
0141911037
-
-
Artech House, Boston, Massachussetts
-
Ferraiolo, D., Kuhn, D., and Chandramouli, S. Role-Based Access Control. Artech House, Boston, Massachussetts, 2003.
-
(2003)
Role-Based Access Control
-
-
Ferraiolo, D.1
Kuhn, D.2
Chandramouli, S.3
-
6
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn, L., and Lin, H. A cryptographic key generation scheme for multilevel data security. Computers and Security 9, 6 (1990), 539-546.
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.2
-
7
-
-
0016984825
-
Protection in operating systems
-
Harrison, M., Ruzzo, W., and Ullman, J. Protection in operating systems. Communications of the ACM 19, 8 (1976), 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
9
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon, S., Taylor, P., Meijer, H., and Akl, S. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers C-34, 9 (1985), 797-802.
-
(1985)
IEEE Transactions on Computers C-34
, vol.9
, pp. 797-802
-
-
MacKinnon, S.1
Taylor, P.2
Meijer, H.3
Akl, S.4
-
11
-
-
4243187063
-
Containment and equivalence for a fragment of XPath
-
Miklau, G., and Suciu, D. Containment and equivalence for a fragment of XPath. Journal of the ACM 51, 1 (2004), 2-45.
-
(2004)
Journal of the ACM
, vol.51
, Issue.1
, pp. 2-45
-
-
Miklau, G.1
Suciu, D.2
-
12
-
-
35248872431
-
XPath containment in the presence of disjunction, DTDs, and variables
-
Neven, F., and Schwentick, T. XPath containment in the presence of disjunction, DTDs, and variables. In Proceedings of 9th International Conference on Database Theory (ICDT 2003) (2003), pp. 315-329.
-
(2003)
Proceedings of 9th International Conference on Database Theory (ICDT 2003)
, pp. 315-329
-
-
Neven, F.1
Schwentick, T.2
-
15
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
Cambridge, Massachusetts
-
Rabin, M. Digitalized signatures and public-key functions as intractable as factorization. Tech. Rep. TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Massachusetts, 1979.
-
(1979)
Tech. Rep. TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology
-
-
Rabin, M.1
-
16
-
-
0242456749
-
A cryptographic solution to implement access control in a hierarchy and more
-
Ray, I., Ray, I., and Narasimhamurthi, N. A cryptographic solution to implement access control in a hierarchy and more. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (2002), pp. 65-73.
-
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (2002)
, pp. 65-73
-
-
Ray, I.1
Ray, I.2
Narasimhamurthi, N.3
-
17
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Tzeng, W.-G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 14, 1 (2002), 182-188.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
18
-
-
0000150571
-
A formal semantics of patterns in XSLT and XPath
-
Wadler, P. A formal semantics of patterns in XSLT and XPath. Markup Languages: Theory and Practice 2, 2 (2000), 183-202.
-
(2000)
Markup Languages: Theory and Practice
, vol.2
, Issue.2
, pp. 183-202
-
-
Wadler, P.1
-
25
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
Yi, X., and Ye, Y. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 15, 4 (2003), 1054-1055.
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
|