-
3
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
(April)
-
Bertino, E., Jajodia, S., and Samarati, P. 1999. A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst. 17, 2 (April), 101-140.
-
(1999)
ACM Trans. Inf. Syst.
, vol.17
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
4
-
-
0034446895
-
A modular approach to composing access control policies
-
(Athens, Greece, Nov.)
-
Bonatti, P., De Capitani Di Vimercati, S., and Samarati, P. 2000. A modular approach to composing access control policies. In Proceedings of the Seventh ACM Conference on Computer and Communication Security (CCS 2000) (Athens, Greece, Nov.), 164-173.
-
(2000)
Proceedings of the Seventh ACM Conference on Computer and Communication Security (CCS 2000)
, pp. 164-173
-
-
Bonatti, P.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
5
-
-
0038323410
-
Design and implementation of an access control processor for XML documents
-
(Amsterdam, May)
-
Damiani, E., De Capitani Di Vimercati, S., Paraboschi, S., and Samarati, P. 2000. Design and implementation of an access control processor for XML documents. In Proceedings of the WWW9 Conference (Amsterdam, May).
-
(2000)
Proceedings of the WWW9 Conference
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
0001119421
-
The stable model semantics for logic programming
-
MIT Press, Cambridge, Mass.
-
Gelfond, M. and Lifschitz, V. 1988. The stable model semantics for logic programming. In Proceedings of the International Conference on Logic Programming (ICLP'88), MIT Press, Cambridge, Mass., 1070-1080.
-
(1988)
Proceedings of the International Conference on Logic Programming (ICLP'88)
, pp. 1070-1080
-
-
Gelfond, M.1
Lifschitz, V.2
-
8
-
-
84983002492
-
Access control in configurable systems
-
J. Vitek and C. Jensen, Eds Springer-Verlag, New York
-
Jaeger, T. 1999. Access control in configurable systems. In Secure Internet Programming, J. Vitek and C. Jensen, Eds., Vol. 1603, Springer-Verlag, New York, 289-310.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 289-310
-
-
Jaeger, T.1
-
9
-
-
0001619596
-
A unified framework for supporting multiple access control policies
-
(June)
-
Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. A unified framework for supporting multiple access control policies. ACM Trans. Database Syst. 26, 2 (June), 214-260.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
10
-
-
0002020664
-
Elements of relational database theory
-
J. van Leeuwen, Ed., Elsevier, New York, Chapter 17
-
Kanellakis, P. 1990. Elements of relational database theory. In Handbook of Theoretical Computer Science, J. van Leeuwen, Ed., Elsevier, New York, Chapter 17.
-
(1990)
Handbook of Theoretical Computer Science
-
-
Kanellakis, P.1
-
11
-
-
0019608720
-
Formal models for computer security
-
(Sept.)
-
Landwehr, C. 1981. Formal models for computer security. Comput. Surv. 13, 3 (Sept.), 247-278.
-
(1981)
Comput. Surv.
, vol.13
, pp. 247-278
-
-
Landwehr, C.1
-
12
-
-
0032671779
-
A logic-based knowledge representation for authorization with delegation
-
(Mordano, Italy, June)
-
LI, N., Feigenbaum, J., and GROSOF, B. 1999. A logic-based knowledge representation for authorization with delegation. In Proceedings of the Twelfth IEEE Computer Security Foundations Workshop (Mordano, Italy, June), 162-174.
-
(1999)
Proceedings of the Twelfth IEEE Computer Security Foundations Workshop
, pp. 162-174
-
-
LI, N.1
Feigenbaum, J.2
GROSOF, B.3
-
13
-
-
0002380358
-
Splitting a logic program
-
MIT Press, Cambridge, Mass.
-
Lifschitz, V. and Turner, H. 1994. Splitting a logic program. In Proceedings of the International Conference on Logic Programming (ICLP'94), MIT Press, Cambridge, Mass., 23-37.
-
(1994)
Proceedings of the International Conference on Logic Programming (ICLP'94)
, pp. 23-37
-
-
Lifschitz, V.1
Turner, H.2
-
15
-
-
0003054727
-
Access control policies for database systems
-
C. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands
-
Lunt, T. 1989. Access control policies for database systems. In Database Security II: Status and Prospects, C. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands, 41-52.
-
(1989)
Database Security II: Status and Prospects
, pp. 41-52
-
-
Lunt, T.1
-
16
-
-
0026119329
-
A model of authorization for next-generation database systems
-
(March)
-
Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1 (March), 89-131.
-
(1991)
ACM Trans. Database Syst.
, vol.16
, pp. 89-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
17
-
-
0003798132
-
-
version 2.2. http://xsb.sourceforge.net
-
Sagonas, K., Swift, T., Wabren, D., Freire, J., and RAO, P. 2000. The XSB programmer's manual, version 2.2. http://xsb.sourceforge.net.
-
(2000)
The XSB programmer's manual
-
-
Sagonas, K.1
Swift, T.2
Wabren, D.3
Freire, J.4
RAO, P.5
-
18
-
-
0027699087
-
Lattice-based access control models
-
(Nov.)
-
Sandhu, R. 1993. Lattice-based access control models. IEEE Computer 26, 11 (Nov.), 9-19.
-
(1993)
IEEE Computer 26
, vol.11
, pp. 9-19
-
-
Sandhu, R.1
-
21
-
-
0003496922
-
-
http://www.cs.umd.edu/projects/ hermes/publications/abstracts/hermes.html
-
Subrahmanian, V., Adali, S., Brink, A., Emery, R., Lu, J., Rajput, A., Rogers, T., Ross, R., and Ward, C. 1997. Hermes: Heterogeneous reasoning and mediator system. http://www.cs.umd.edu/projects/ hermes/publications/abstracts/hermes.html.
-
(1997)
Hermes: Heterogeneous reasoning and mediator system.
-
-
Subrahmanian, V.1
Adali, S.2
Brink, A.3
Emery, R.4
Lu, J.5
Rajput, A.6
Rogers, T.7
Ross, R.8
Ward, C.9
-
22
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
Woo, T. and Lam, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2-3, 107-136.
-
(1993)
J. Comput. Sec.
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
|