메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-403

Building trustworthy semantic webs

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85055931576     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420013221     Document Type: Book
Times cited : (16)

References (283)
  • 1
    • 84910857878 scopus 로고
    • Committee on Multilevel Data Management Security
    • National Academy Press, Washington, D.C
    • Air Force Studies Board, Committee on Multilevel Data Management Security. Multilevel Data Management Security, National Academy Press, Washington, D.C., 1983.
    • (1983) Multilevel Data Management Security
  • 3
    • 0031222594 scopus 로고    scopus 로고
    • Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions, IEEE Trans
    • Atluri, V., S. Jajodia, and E. Bertino, Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions, IEEE Trans. Knowledge Data Eng. 9(5): 697–708, 1997.
    • (1997) Knowledge Data Eng , vol.9 , Issue.5 , pp. 697-708
    • Atluri, V.1    Jajodia, S.2    Bertino, E.3
  • 5
    • 13844271963 scopus 로고    scopus 로고
    • Selective and authentic third party publication of XML documents
    • Bertino, E. et al., Selective and authentic third party publication of XML documents, IEEE Trans. Knowledge Data Eng. 16 (10): 1263–1278, 2004.
    • (2004) IEEE Trans. Knowledge Data Eng. , vol.16 , Issue.10 , pp. 1263-1278
    • Bertino, E.1
  • 11
    • 77954107830 scopus 로고    scopus 로고
    • Secure database systems
    • M. Piatini and O. Diaz, Eds., Artech House, London, UK
    • Ferrari E. and B. Thuraisingham, Secure database systems, in Advances in Database Management, M. Piatini and O. Diaz, Eds., Artech House, London, UK, 2000.
    • (2000) Advances in Database Management
    • Ferrari, E.1    Thuraisingham, B.2
  • 14
    • 0020299523 scopus 로고
    • Security Policies and Security Models
    • Oakland, CA
    • Goguen, J. and J. Meseguer, Security Policies and Security Models, Proc. IEEE Symp. on Security Privacy, Oakland, CA, April 1982.
    • (1982) Proc. IEEE
    • Goguen, J.1    Meseguer, J.2
  • 19
    • 84985909197 scopus 로고    scopus 로고
    • Data Mining for Computer Security Applications
    • Melbourne, FL
    • Lazarevic, A., et al., Data Mining for Computer Security Applications, Tutorial Proc. IEEE Data Mining Conf., Melbourne, FL, 2003.
    • (2003) Tutorial
    • Lazarevic, A.1
  • 20
    • 3142632087 scopus 로고    scopus 로고
    • Techniques and tools for analyzing intrusion alerts
    • Ning, P., et al., Techniques and tools for analyzing intrusion alerts, ACM Trans. Inf. Syst. Security, 7(2), 2004.
    • (2004) ACM Trans. , vol.7 , Issue.2
    • Ning, P.1
  • 22
    • 85055952737 scopus 로고    scopus 로고
    • Object Management Group, www.omg.org.
  • 25
    • 84910867416 scopus 로고
    • National Computer Security Center, Gaithersburg, MD
    • Trusted Database Interpretation, National Computer Security Center, Gaithersburg, MD, 1991.
    • (1991) Trusted Database Interpretation
  • 27
    • 0026403732 scopus 로고
    • Multilevel Security for Distributed Database Systems
    • Thuraisingham, B., Multilevel Security for Distributed Database Systems, Comput. Security, 10(9): 727–747, 1991.
    • (1991) Comput. Security , vol.10 , Issue.9 , pp. 727-747
    • Thuraisingham, B.1
  • 28
    • 0028730609 scopus 로고
    • Multilevel Security for Federated Database Systems
    • Thuraisingham, B., Multilevel Security for Federated Database Systems, Comput. Security, 13(6): 509–525, 1994.
    • (1994) Comput. , vol.13 , Issue.6 , pp. 509-525
    • Thuraisingham, B.1
  • 34
    • 24644455920 scopus 로고    scopus 로고
    • Privacy constraint processing in a privacy enhanced database management system
    • Thuraisingham, B., Privacy constraint processing in a privacy enhanced database management system, Data Knowledge Eng. J., November 2005.
    • (2005) Data Knowledge Eng. J.
    • Thuraisingham, B.1
  • 35
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
    • (1993) Data Knowledge Eng. J , vol.11 , Issue.3
    • Thuraisingham, B.1    Ford, W.2    Collins, M.3
  • 36
    • 0003969639 scopus 로고
    • National Computer Security Center, Gaitherburg, MD
    • Trusted Network Interpretation, National Computer Security Center, Gaitherburg, MD, 1987.
    • (1987) Trusted Network Interpretation
  • 38
    • 85055946182 scopus 로고    scopus 로고
    • ACM SIGMOD Record, 30(3), 2001.
    • (2001) ACM SIGMOD Record , vol.30 , Issue.3
  • 41
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E. et al., The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Security, 2(1), 1999.
    • (1999) ACM Trans. Inf. Syst. Security , vol.2 , Issue.1
    • Bertino, E.1
  • 44
    • 0014797273 scopus 로고
    • A relational model of data for large shared data banks
    • Codd, E.F., A relational model of data for large shared data banks, Commn. ACM, 13(6), 1970.
    • (1970) Commn. , vol.13 , Issue.6
    • Codd, E.F.1
  • 45
    • 85055919969 scopus 로고    scopus 로고
    • Collaborative Computing
    • Collaborative Computing, IEEE Comput., 32 Special Issue (9), 1999.
    • (1999) IEEE Comput , vol.32
  • 46
    • 85055923726 scopus 로고
    • Computer supported cooperative work
    • Special Issue, December
    • Computer supported cooperative work, Commn. ACM, Special Issue, December 1991.
    • (1991) Commn. ACM
  • 49
    • 0008531833 scopus 로고
    • IEEE Tutorial, IEEE Computer Society Press, Washington, D.C
    • Hurson, A. et al., Eds., Parallel Architectures for Databases, IEEE Tutorial, IEEE Computer Society Press, Washington, D.C., 1989.
    • (1989) Parallel Architectures for Databases
    • Hurson, A.1
  • 50
    • 85055928935 scopus 로고    scopus 로고
    • Special Issue on Audio Mining
    • IEEE Comput. Magazine, Special Issue on Audio Mining, 36, 2003.
    • (2003) IEEE Comput. Magazine , vol.36
  • 52
  • 62
    • 84992967091 scopus 로고    scopus 로고
    • Collaborative commerce and knowledge management
    • Thuraisingham, B. et al, Collaborative commerce and knowledge management, Knowledge Process. Manage. J., 9(1): 43–53, 2002.
    • (2002) Knowledge Process. Manage. J. , vol.9 , Issue.1 , pp. 43-53
    • Thuraisingham, B.1
  • 67
    • 6344266140 scopus 로고
    • Mediators in the architecture of future information systems
    • Wiederhold, G., Mediators in the architecture of future information systems, IEEE Comput., March 1992.
    • (1992) IEEE Comput.
    • Wiederhold, G.1
  • 68
    • 84976753050 scopus 로고
    • An Object-Oriented Approach to Multimedia Databases
    • Washington, D.C
    • Woelk, D. et al., An Object-Oriented Approach to Multimedia Databases, Proc. ACM SIGMOD Conf., Washington, D.C., June 1986.
    • (1986) Proc. ACM SIGMOD Conf
    • Woelk, D.1
  • 70
    • 85055918108 scopus 로고    scopus 로고
    • Secure third party publication of XML documents
    • Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., 10, 2004.
    • (2004) IEEE , vol.10
    • Bertino, E.1
  • 73
    • 0040802324 scopus 로고
    • Springer-Verlag, Heidelberg
    • Lloyd, J., Logic Programming, Springer-Verlag, Heidelberg, 1987.
    • (1987) Logic Programming
    • Lloyd, J.1
  • 76
    • 85055924637 scopus 로고    scopus 로고
    • www.w3c.org.
  • 77
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • Dallas, TX
    • Agrawal, R. and R. Srikant, Privacy-preserving data mining, Proc. ACM SIGMOD Conf., Dallas, TX, May 2000.
    • (2000) Proc. ACM SIGMOD
    • Agrawal, R.1    Srikant, R.2
  • 80
    • 0344559510 scopus 로고    scopus 로고
    • Access control for XML documents
    • Bertino, E. et al., Access control for XML documents, Data Knowledge Eng., 43(3), 2002.
    • (2002) Data Knowledge Eng , vol.43 , Issue.3
    • Bertino, E.1
  • 81
    • 85055918108 scopus 로고    scopus 로고
    • Secure third party publication of XML documents
    • Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge and Data Eng., 10, 2004.
    • (2004) IEEE , vol.10
    • Bertino, E.1
  • 82
    • 85055493211 scopus 로고    scopus 로고
    • Trust-based context aware access control models in Web services
    • San Diego
    • Bhatty R., E. Bertino, and A. Ghafoor, Trust-based context aware access control models in Web services, Proc. Web Services Conf., San Diego, July 2004.
    • (2004) Proc. Web Services Conf.
    • Bhatty, R.1    Bertino, E.2    Ghafoor, A.3
  • 84
    • 84976766949 scopus 로고
    • The entity relationships model—toward a unified view of data
    • Chen, P., The entity relationships model—toward a unified view of data, ACM Trans. Database Syst., 1, 1976.
    • (1976) ACM , vol.1
    • Chen, P.1
  • 88
    • 85055948699 scopus 로고    scopus 로고
    • Inference problem for the semantic Web
    • Colorado, August 2003, Kluwer, Dordrecht, The Netherlands
    • Farkas, C. et al., Inference problem for the semantic Web, Proc. IFIP Conf. Data Applications Security, Colorado, August 2003, Kluwer, Dordrecht, The Netherlands, 2004.
    • (2004) Proc. IFIP Conf. Data
    • Farkas, C.1
  • 90
    • 10044250804 scopus 로고    scopus 로고
    • Research problems in data stream processing and privacy-preserving data mining
    • Baltimore, MD
    • Gehrke, J., Research problems in data stream processing and privacy-preserving data mining, Proc. Next Generation Data Mining Workshop, Baltimore, MD, November 2002.
    • (2002) Proc. Next Generation Data Mining Workshop
    • Gehrke, J.1
  • 91
    • 0036204131 scopus 로고    scopus 로고
    • Providing database as a service
    • San Jose, CA
    • Hacigumus, H. et al., Providing database as a service, Proc. IEEE Data Engineering Conf., San Jose, CA, March 2002.
    • (2002) Proc. IEEE Data Engineering
    • Hacigumus, H.1
  • 94
  • 95
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B. et al, Design and implementation of a database inference controller, Data Knowledge Eng. J. 11(3), 1993.
    • (1993) Data Knowledge Eng. J , vol.11 , Issue.3
    • Thuraisingham, B.1
  • 96
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B., Security issues for federated database systems, Comput. Security, 13(6), 1994.
    • (1994) Comput. , vol.13 , Issue.6
    • Thuraisingham, B.1
  • 101
    • 84997061532 scopus 로고    scopus 로고
    • Administering the semantic Web, confidentiality, privacy and trust
    • Thuraisingham, B. et al., Administering the semantic Web, confidentiality, privacy and trust, J. Inf. Security Privacy, 2006.
    • (2006) J. Inf. Security Privacy
    • Thuraisingham, B.1
  • 102
    • 84954418287 scopus 로고    scopus 로고
    • A Unified Scheme for Resource Protection in Automated Trust Negotiation
    • Oakland, CA
    • Yu, T. and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA., May 2003.
    • (2003) IEEE Symposium on Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 103
    • 85055958104 scopus 로고    scopus 로고
    • http://xml.apache.org/security/.
  • 104
    • 85055949965 scopus 로고    scopus 로고
    • http://www.w3.org/Signature/.
  • 105
    • 85055933817 scopus 로고    scopus 로고
    • http://www.w3.org/Encryption/2001/.
  • 107
    • 0344559510 scopus 로고    scopus 로고
    • Access control for XML documents
    • Bertino, E. et al., Access control for XML documents, Data Knowledge Eng., 43(3), 2002.
    • (2002) Data Knowledge Eng , vol.43 , Issue.3
    • Bertino, E.1
  • 108
    • 33745205316 scopus 로고    scopus 로고
    • Secure third party publication of XML documents
    • Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., October 2004.
    • (2004) IEEE Trans. Knowledge Data Eng.
    • Bertino, E.1
  • 109
    • 85055933932 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards. http://www.oasis-open.org/home/index.php.
  • 114
  • 116
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model
    • Park, J. and R.S. Sandhu, The UCONABC usage control model, ACM Trans. Inf. Syst. Secur., 7(1), 128–174, 2004.
    • (2004) ACM Trans. Inf. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.S.2
  • 123
    • 10044293324 scopus 로고    scopus 로고
    • Security standards for the semantic Web
    • Thuraisingham, B., Security standards for the semantic Web, Comput. Stand. Interface J., 2005.
    • (2005) Comput. Stand.
    • Thuraisingham, B.1
  • 127
    • 0040802324 scopus 로고
    • Springer-Verlag, Heidelberg
    • Lloyd, J., Logic Programming, Springer-Verlag, Heidelberg, 1987.
    • (1987) Logic Programming
    • Lloyd, J.1
  • 128
    • 33747486880 scopus 로고
    • A nonmonotonic typed multilevel logic for secure data and knowledge base management systems
    • Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems, Proc. Comput. Security Foundations Workshop, 1991.
    • (1991) Proc. Comput. Security Foundations Workshop
    • Thuraisingham, B.1
  • 129
    • 85055933889 scopus 로고
    • A nonmonotonic typed multilevel logic for secure data and knowledge base management systems-II
    • Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems-II, Proc. Comput. Security Foundations Workshop, 1992.
    • (1992) Proc. Comput. Security Foundations Workshop
    • Thuraisingham, B.1
  • 130
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
    • (1993) Data Knowledge Eng. J , vol.11 , Issue.3
    • Thuraisingham, B.1    Ford, W.2    Collins, M.3
  • 131
    • 85055937211 scopus 로고    scopus 로고
    • www.w3c.org.
  • 134
    • 85055946665 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Digital_Rights_Management.
  • 137
    • 31744441264 scopus 로고    scopus 로고
    • Trust networks on the semantic Web
    • Helsinki, Finland
    • Golbeck, J., B. Parsia, and J. Hendler, Trust networks on the semantic Web, Proc. Cooperative Inf. Agents, August 27-29, 2003, Helsinki, Finland.
    • (2003) Proc.
    • Golbeck, J.1    Parsia, B.2    Hendler, J.3
  • 138
    • 0242276201 scopus 로고    scopus 로고
    • A policy based approach to security for the semantic Web
    • Sanibel Island, Florida
    • Kagal, L., T. Finin, and A. Joshi, A policy based approach to security for the semantic Web, Proc. Second Int. Semantic Web Conf., Sanibel Island, Florida, 2003, 402-418.
    • (2003) Proc. Second Int. Semantic Web Conf. , pp. 402-418
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 139
    • 85055947128 scopus 로고    scopus 로고
    • Technical Report, The University of Texas at Dallas
    • Kantarcioglu, M. et al., Risk-based Access Control, Technical Report, The University of Texas at Dallas, 2006.
    • (2006) Risk-Based Access Control
    • Kantarcioglu, M.1
  • 151
    • 84995288300 scopus 로고    scopus 로고
    • Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University
    • Sweeney, L., Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University, ACM Comput. Soc., 34, 2004.
    • (2004) ACM Comput. Soc. , pp. 34
    • Sweeney, L.1
  • 152
  • 153
    • 0029290760 scopus 로고
    • Security constraint processing in a multilevel distributed database management system
    • Thuraisingham, B. and W. Ford, Security constraint processing in a multilevel distributed database management system, IEEE Trans. Knowledge Data Eng., 7, 1995.
    • (1995) IEEE Trans. Knowledge Data Eng. , vol.7
    • Thuraisingham, B.1    Ford, W.2
  • 155
    • 84997061532 scopus 로고    scopus 로고
    • Administering the semantic Web, confidentiality, privacy and trust
    • Thuraisingham, B. et al., Administering the semantic Web, confidentiality, privacy and trust, J. Inf. Security Privacy, 2006.
    • (2006) J. Inf. Security Privacy
    • Thuraisingham, B.1
  • 159
    • 85055921687 scopus 로고    scopus 로고
    • Secure third party publication of XML documents, IEEE
    • Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., 10, 2004.
    • (2004) Trans. Knowledge Data Eng. , vol.10
    • Bertino, E.1
  • 165
    • 0025065653 scopus 로고
    • Polyinstantiation integrity in multilevel relations
    • Oakland, CA
    • Jajodia, S. and R. Sandhu, Polyinstantiation integrity in multilevel relations, Proc. IEEE Symp. Security Privacy, Oakland, CA, April 1990.
    • (1990) Proc. IEEE Symp. Security Privacy
    • Jajodia, S.1    Sandhu, R.2
  • 166
    • 85055954264 scopus 로고
    • Concurrency control for trusted database management system
    • Ko, H. and B. Thuraisingham, Concurrency control for trusted database management system, ACM SIGMOD Record, December 1993.
    • (1993) ACM SIGMOD Record
    • Ko, H.1    Thuraisingham, B.2
  • 167
    • 0041491441 scopus 로고    scopus 로고
    • DAML+OIL: An ontology language for the semantic Web
    • McGuiness, D. et al., DAML+OIL: An ontology language for the semantic Web, IEEE Intelligent Syst., 17, 2002.
    • (2002) IEEE Intelligent Syst. , vol.17
    • McGuiness, D.1
  • 168
    • 0025447566 scopus 로고
    • Design of LDV: A multilevel secure relational database management system
    • Stachour, P. and B. Thuraisingham, Design of LDV: A multilevel secure relational database management system, IEEE Trans. Knowledge Data Eng., 2(2), 1990.
    • (1990) IEEE Trans. Knowledge Data Eng , vol.2 , Issue.2
    • Stachour, P.1    Thuraisingham, B.2
  • 169
    • 85055918719 scopus 로고
    • presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, (also available as MITRE technical Paper MTP291 June 1990)
    • Thuraisingham, B., Recursion Theoretic Properties of the Inference Problem, presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE technical Paper MTP291 June 1990).
    • (1990) Recursion Theoretic Properties of the Inference Problem
    • Thuraisingham, B.1
  • 170
    • 10444228465 scopus 로고
    • The use of conceptual structures to handle the inference problem
    • Shepherdstown, WV
    • Thuraisingham, B., The use of conceptual structures to handle the inference problem, Proc. IFIP Database Security Conf., Shepherdstown, WV, 1991.
    • (1991) Proc. IFIP Database Security Conf
    • Thuraisingham, B.1
  • 171
    • 33747486880 scopus 로고
    • A Nonmonotonic Typed Multilevel Logic for Secure Data and Knowledge Base Management Systems
    • Franconia, NH
    • Thuraisingham, B., A Nonmonotonic Typed Multilevel Logic for Secure Data and Knowledge Base Management Systems, Proc. Comput. Security Found. Workshop, Franconia, NH, 1991.
    • (1991) Proc. Comput. Security Found. Workshop
    • Thuraisingham, B.1
  • 172
    • 85052688206 scopus 로고
    • Towards the design of a standard multilevel relational data model
    • Thuraisingham, B., Towards the design of a standard multilevel relational data model, Comp. Stand. Interface J., 1993.
    • (1993) Comp. Stand. Interface J.
    • Thuraisingham, B.1
  • 175
    • 85055571738 scopus 로고
    • On the problem of security in data bases
    • Monterey, CA
    • Simon, W., On the problem of security in data bases, Proc. IFIP Database Security Conf., Monterey, CA, 1989.
    • (1989) Proc. IFIP Database Security
    • Simon, W.1
  • 178
    • 0001071507 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • Anguilla, British West Indies, February
    • Blaze, M., J. Feigenbaum, and M. Strauss, Compliance checking in the policymaker trust management system, in Proc. 2nd Conf. Financial Cryptography, Anguilla, British West Indies, February 1998.
    • (1998) Proc. 2Nd Conf. Financial Cryptography
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 180
    • 33746103325 scopus 로고    scopus 로고
    • Technical Report, I2-D4, Working Group I2, EU NoE REWERSE
    • Bonatti, P.A., D. Olmedilla, and J. Peer, Advanced Policy Queries. Technical Report, I2-D4, Working Group I2, EU NoE REWERSE, 2005. http://www.rewerse.net.
    • (2005) Advanced Policy Queries
    • Bonatti, P.A.1    Olmedilla, D.2    Peer, J.3
  • 182
    • 33747486880 scopus 로고
    • A nonmonotonic typed multilevel logic for secure data and knowledge base management systems
    • Franconia, NH
    • Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems, Proc. Comp. Security Found. Workshop, Franconia, NH, 1991.
    • (1991) Proc. Comp. Security Found. Workshop
    • Thuraisingham, B.1
  • 183
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B., Security issues for federated database systems, Comp. Security, 13(6), 1994.
    • (1994) Comp. Security , vol.13 , Issue.6
    • Thuraisingham, B.1
  • 185
    • 30644474741 scopus 로고    scopus 로고
    • GEO-RBAC: A spatially aware RBAC
    • Bertino E. et al., GEO-RBAC: a spatially aware RBAC, Proc. Symp. Access Control Models, Applications and Technologies (SACMAT), 2005.
    • (2005) Proc. Symp. Access Control
    • Bertino, E.1
  • 188
    • 85055942202 scopus 로고    scopus 로고
    • GEO-XACML, http://www.geoxacml.org/.
    • GEO-XACML
  • 192
    • 85055956720 scopus 로고    scopus 로고
    • OASIS: http://www.oasis-open.org/home/index.php.
    • OASIS
  • 193
    • 85055943318 scopus 로고    scopus 로고
    • www.omg.org.
  • 194
    • 85055935177 scopus 로고    scopus 로고
    • OpenSAML: http://www.opensaml.org/.
    • Opensaml
  • 195
    • 85055942119 scopus 로고    scopus 로고
    • Shibboleth, http://middleware.internet2.edu/pki05/proceedings/chadwick-distributed-shibboleth.pdf.
  • 196
    • 85055936159 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Service-oriented_architecture.
  • 197
    • 85055932301 scopus 로고    scopus 로고
    • www.terena.nl/activities/tf-aace/workshop/presentations/Distributed_trust_model1.ppt.
  • 200
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E. et al., The specification and enforcement of authorization constraints in workflow management systems, ACM Trans. Inf. Syst. Security, 2(1), 1999.
    • (1999) ACM Trans. Inf. Syst. Security , vol.2 , Issue.1
    • Bertino, E.1
  • 203
    • 85055956256 scopus 로고
    • Security for collaborative computer systems, multimedia review
    • Demurjian, S. et al., Security for collaborative computer systems, multimedia review, J. Multimedia Comput., 5, Summer 1993.
    • (1993) J. Multimedia Comput , vol.5
    • Demurjian, S.1
  • 204
    • 85055482745 scopus 로고    scopus 로고
    • Analyzing the safety of workflow authorization models
    • Chalidiki, Greece, July 1998, Kluwer, Dordrecht
    • Huang, W. and V. Atluri, Analyzing the safety of workflow authorization models, Proc. IFIP Database Security Conf., Chalidiki, Greece, July 1998, Kluwer, Dordrecht, 1999.
    • (1999) Proc. IFIP Database Security Conf
    • Huang, W.1    Atluri, V.2
  • 205
    • 85055929621 scopus 로고    scopus 로고
    • http://xml.coverpages.org/wf-xml.html.http://www.csd.abdn.ac.uk/~apreece/research/download/ekaw2004.pdf.
  • 209
    • 33947244773 scopus 로고
    • Security for multimedia database systems
    • Halifax, UK
    • Thuraisingham, B., Security for multimedia database systems, Proc. IFIP Data Security Conf., Halifax, UK, 1990.
    • (1990) Proc. IFIP Data
    • Thuraisingham, B.1
  • 211
    • 32944456462 scopus 로고    scopus 로고
    • Knowledge management and the semantic Web: From scenario to technology
    • Warren, P., Knowledge management and the semantic Web: from scenario to technology, IEEE Intelligent Sys., 21(1), 53–59, 2006.
    • (2006) IEEE Intelligent Sys. , vol.21 , Issue.1 , pp. 53-59
    • Warren, P.1
  • 212
    • 0027313815 scopus 로고
    • A Model of atomicity for multilevel transactions
    • Oakland, California
    • Blaustein, B., A Model of atomicity for multilevel transactions, Proc. IEEE Symp. Security and Privacy, Oakland, California, May 1993.
    • (1993) Proc. IEEE
    • Blaustein, B.1
  • 213
    • 84870967868 scopus 로고    scopus 로고
    • Availability policies in an adversarial environment
    • Lake Arrowhead, CA
    • Hosmer, H., Availability policies in an adversarial environment, Proc. New Comput. Security Paradigms Workshop, Lake Arrowhead, CA, Sept. 1996.
    • (1996) Proc. New
    • Hosmer, H.1
  • 214
    • 85055466776 scopus 로고
    • Integrating concurrency control and commit algorithms in distributed multilevel secure databases
    • Huntsville, Alabama, 1993. North-Holland, Amsterdam
    • Jajodia, S. et al, Integrating concurrency control and commit algorithms in distributed multilevel secure databases, Proc. IFIP Database Security, Huntsville, Alabama, 1993. North-Holland, Amsterdam, 1994.
    • (1994) Proc. IFIP Database Security
    • Jajodia, S.1
  • 215
    • 85055946349 scopus 로고    scopus 로고
    • Integrity constraints in federated databases
    • Como, Italy
    • Olivier, M., Integrity constraints in federated databases, Proc. IFIP Database Security Conference, Como, Italy 1996.
    • (1996) Proc. IFIP Database
    • Olivier, M.1
  • 217
    • 0026403732 scopus 로고
    • Multilevel security issues in distributed database management systems – II
    • Thuraisingham, B., Multilevel security issues in distributed database management systems – II, Comput. Security, 10(9), 1991.
    • (1991) Comput. Security , vol.10 , Issue.9
    • Thuraisingham, B.1
  • 218
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B., Security issues for federated database systems, Comput. Security, 13(6), 1994.
    • (1994) Comput. , vol.13 , Issue.6
    • Thuraisingham, B.1
  • 220
    • 0342296051 scopus 로고
    • Multilevel security issues for distributed database management systems-III
    • Thuraisingham, B. and Rubinovitz, H., Multilevel security issues for distributed database management systems-III, Comput. Security, 11(7), 1992.
    • (1992) Comput. Security , vol.11 , Issue.7
    • Thuraisingham, B.1    Rubinovitz, H.2
  • 221
    • 85055510860 scopus 로고
    • Security Constraint Processing in a Heterogeneous Database System
    • Thuraisingham, B. and H. Rubinovitz, Security Constraint Processing in a Heterogeneous Database System, Proc. ACM Comput. Conf., Phoenix, AZ, March 1994.
    • (1994) Proc. ACM Comput. Conf
    • Thuraisingham, B.1    Rubinovitz, H.2
  • 222
    • 77954694081 scopus 로고    scopus 로고
    • Secure supply-chain protocols
    • Newport Beach, CA
    • Atallah, M., et al, Secure supply-chain protocols, Proc. Int. Conf. Electronic Commerce, Newport Beach, CA, 2003.
    • (2003) Proc. Int. Conf. Electronic
    • Atallah, M.1
  • 223
    • 85055931565 scopus 로고    scopus 로고
    • eBXML, http://en.wikipedia.org/wiki/EbXML.
  • 225
    • 85055949231 scopus 로고    scopus 로고
    • http://istresults.cordis.lu/index.cfm/section/news/tpl/article/ID/78390/BrowsingType/Features.
  • 226
    • 85055947611 scopus 로고    scopus 로고
    • http://www.semantic-Web.at/57.219.219.press.ontologies-for-e-business.htm.
  • 227
    • 84904258786 scopus 로고    scopus 로고
    • A fair-exchange E-commerce protocol with automated dispute resolution
    • Amsterdam, The Netherlands, August 2000, Kluwer, Dordrecht
    • Ray, I. et al., A fair-exchange E-commerce protocol with automated dispute resolution, Proc. IFIP Database Security Conf., Amsterdam, The Netherlands, August 2000, Kluwer, Dordrecht, 2001.
    • (2001) Proc. IFIP Database Security Conf
    • Ray, I.1
  • 229
    • 33646894100 scopus 로고    scopus 로고
    • Semantic information assurance for secure distributed knowledge management: A business process perspective
    • Singh, R. and A.F. Salam, Semantic information assurance for secure distributed knowledge management: a business process perspective, IEEE Tran. Syst. Man Cybernetics, May 2006.
    • (2006) IEEE Tran. Syst. Man Cybernetics
    • Singh, R.1    Salam, A.F.2
  • 231
    • 33745183328 scopus 로고    scopus 로고
    • Security and privacy for semantic E-business, Commn
    • Thuraisingham, B. Security and privacy for semantic E-business, Commn. Assoc. Comput. Machinery, 48(12): 71–73, 2005.
    • (2005) Assoc. Comput. Machinery , vol.48 , Issue.12 , pp. 71-73
    • Thuraisingham, B.1
  • 234
    • 85055951842 scopus 로고    scopus 로고
    • National Academy of Sciences Study Report
    • National Academy Press, Washington, D.C
    • National Academy of Sciences Study Report, Protecting Children from Inappropriate Content on the Internet, National Academy Press, Washington, D.C., 2002.
    • (2002) Protecting Children from Inappropriate Content on the Internet
  • 235
    • 0030216932 scopus 로고    scopus 로고
    • An authorization model for a distributed hypertext system
    • Samarati, P. et al., An authorization model for a distributed hypertext system, IEEE Trans. Knowledge Data Eng., 8(4), 1996.
    • (1996) IEEE Trans. Knowledge Data Eng , vol.8 , Issue.4
    • Samarati, P.1
  • 238
    • 0027853601 scopus 로고
    • Design and implementation of a database inference controller
    • Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
    • (1993) Data Knowledge Eng. J , vol.11 , Issue.3
    • Thuraisingham, B.1    Ford, W.2    Collins, M.3
  • 240
    • 33751055231 scopus 로고    scopus 로고
    • Dependable and secure TMO scheme
    • Gyeongju, Korea
    • Kim, J. and B. Thuraisingham, Dependable and secure TMO scheme, Proc. IEEE ISORC Conf., Gyeongju, Korea, April 2006.
    • (2006) Proc. IEEE
    • Kim, J.1    Thuraisingham, B.2
  • 241
    • 85055928605 scopus 로고
    • Self-protecting objects in a secure federated database
    • New York
    • Olivier, M.S., Self-protecting objects in a secure federated database, Proc. IFIP Database Security Conf., New York, August 1995.
    • (1995) Proc. IFIP
    • Olivier, M.S.1
  • 242
    • 3142523603 scopus 로고    scopus 로고
    • The UCONABC usage control model, ACM Trans. Inf
    • Park, J. and R.S. Sandhu, The UCONABC usage control model, ACM Trans. Inf. Syst. Secur., 7(1): 128-174, 2004.
    • (2004) Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.S.2
  • 245
    • 85055921031 scopus 로고
    • Novel approaches to the inference problem
    • Thuraisingham, B., Novel approaches to the inference problem, Proc. 3rd RADC (Rome Air Development Center) Database Security Workshop, New York, June 1990.
    • (1990) Proc. 3Rd
    • Thuraisingham, B.1
  • 246
    • 0028730609 scopus 로고
    • Security issues for federated database systems
    • Thuraisingham, B., Security issues for federated database systems, Comput. Security, December 1994.
    • (1994) Comput.
    • Thuraisingham, B.1
  • 247
    • 2542644405 scopus 로고    scopus 로고
    • Information survivability for real-time command and control systems
    • Thuraisingham, B. and J. Maurer, Information survivability for real-time command and control systems, IEEE Trans. Knowledge Data Eng., January 1999.
    • (1999) IEEE Trans. Knowledge Data Eng.
    • Thuraisingham, B.1    Maurer, J.2
  • 259
    • 85055951287 scopus 로고    scopus 로고
    • Technical Report, The University of Texas at Dallas
    • Alam, A. and B. Thuraisingham, GRDF and Secure GRDF, Technical Report, The University of Texas at Dallas, 2006.
    • (2006) GRDF and Secure GRDF
    • Alam, A.1    Thuraisingham, B.2
  • 262
    • 85055945238 scopus 로고    scopus 로고
    • Geospatial data mining
    • New Brunswick, NJ
    • Li, C. et al., Geospatial data mining, Proc. ISI Conf., New Brunswick, NJ, 2007.
    • (2007) Proc. ISI Conf
    • Li, C.1
  • 265
    • 0029290760 scopus 로고
    • Security constraint processing in a multilevel distributed database management
    • Thuraisingham, B. and W. Ford, Security constraint processing in a multilevel distributed database management, IEEE Trans. Knowledge Data Eng., April 1995.
    • (1995) IEEE Trans. Knowledge Data Eng.
    • Thuraisingham, B.1    Ford, W.2
  • 266
    • 85055950861 scopus 로고    scopus 로고
    • Technical Report, University of Texas at Dallas
    • Thuraisingham, B. et al., DAGIS Architecture, Technical Report, University of Texas at Dallas, 2007.
    • (2007) DAGIS Architecture
    • Thuraisingham, B.1
  • 268
    • 85012180694 scopus 로고    scopus 로고
    • Operator Scheduling in a Data Stream Manager
    • Berlin, Germany
    • Carney, D. et al., Operator Scheduling in a Data Stream Manager, Proc. 29th Int. Conf. Very Large Data Bases, Berlin, Germany, 2003.
    • (2003) Proc. 29Th
    • Carney, D.1
  • 273
    • 85055532478 scopus 로고    scopus 로고
    • Security Issues in Mobile Database Access
    • Chalcidici, Greece, July 1998, Kluwer, Dordrecht
    • Lubinski, A., Security Issues in Mobile Database Access, Proc. IFIP Database Security Conf., Chalcidici, Greece, July 1998, Kluwer, Dordrecht, 1999.
    • (1999) Proc. IFIP Database
    • Lubinski, A.1
  • 277
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • Perrig, A. et al., Security in wireless sensor networks, Commn. ACM, 2004.
    • (2004) Commn. ACM
    • Perrig, A.1
  • 281
    • 85055954606 scopus 로고    scopus 로고
    • Security and privacy for sensor databases, sensor letters
    • Inaugural Issue, March
    • Thuraisingham, B., Security and privacy for sensor databases, sensor letters, Am. Sci., Inaugural Issue, March 2004.
    • (2004) Am. Sci.
    • Thuraisingham, B.1
  • 283
    • 85055927784 scopus 로고    scopus 로고
    • SensorML http://en.wikipedia.org/wiki/SensorML.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.