-
1
-
-
84910857878
-
Committee on Multilevel Data Management Security
-
National Academy Press, Washington, D.C
-
Air Force Studies Board, Committee on Multilevel Data Management Security. Multilevel Data Management Security, National Academy Press, Washington, D.C., 1983.
-
(1983)
Multilevel Data Management Security
-
-
-
3
-
-
0031222594
-
Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions, IEEE Trans
-
Atluri, V., S. Jajodia, and E. Bertino, Transaction processing in multilevel secure databases with kernelized architectures: Challenges and solutions, IEEE Trans. Knowledge Data Eng. 9(5): 697–708, 1997.
-
(1997)
Knowledge Data Eng
, vol.9
, Issue.5
, pp. 697-708
-
-
Atluri, V.1
Jajodia, S.2
Bertino, E.3
-
4
-
-
0003400251
-
-
M74-244, The MITRE Corporation, Bedford, MA
-
Bell, D. and L. LaPadula, Secure Computer Systems: Mathematical Foundations and Model, M74-244, The MITRE Corporation, Bedford, MA, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.1
Lapadula, L.2
-
5
-
-
13844271963
-
Selective and authentic third party publication of XML documents
-
Bertino, E. et al., Selective and authentic third party publication of XML documents, IEEE Trans. Knowledge Data Eng. 16 (10): 1263–1278, 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng.
, vol.16
, Issue.10
, pp. 1263-1278
-
-
Bertino, E.1
-
11
-
-
77954107830
-
Secure database systems
-
M. Piatini and O. Diaz, Eds., Artech House, London, UK
-
Ferrari E. and B. Thuraisingham, Secure database systems, in Advances in Database Management, M. Piatini and O. Diaz, Eds., Artech House, London, UK, 2000.
-
(2000)
Advances in Database Management
-
-
Ferrari, E.1
Thuraisingham, B.2
-
14
-
-
0020299523
-
Security Policies and Security Models
-
Oakland, CA
-
Goguen, J. and J. Meseguer, Security Policies and Security Models, Proc. IEEE Symp. on Security Privacy, Oakland, CA, April 1982.
-
(1982)
Proc. IEEE
-
-
Goguen, J.1
Meseguer, J.2
-
19
-
-
84985909197
-
Data Mining for Computer Security Applications
-
Melbourne, FL
-
Lazarevic, A., et al., Data Mining for Computer Security Applications, Tutorial Proc. IEEE Data Mining Conf., Melbourne, FL, 2003.
-
(2003)
Tutorial
-
-
Lazarevic, A.1
-
20
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P., et al., Techniques and tools for analyzing intrusion alerts, ACM Trans. Inf. Syst. Security, 7(2), 2004.
-
(2004)
ACM Trans.
, vol.7
, Issue.2
-
-
Ning, P.1
-
22
-
-
85055952737
-
-
Object Management Group, www.omg.org.
-
-
-
-
25
-
-
84910867416
-
-
National Computer Security Center, Gaithersburg, MD
-
Trusted Database Interpretation, National Computer Security Center, Gaithersburg, MD, 1991.
-
(1991)
Trusted Database Interpretation
-
-
-
26
-
-
84976740459
-
-
Mandatory Security for Object-Oriented Database Systems, New Orleans, October
-
Thuraisingham, B., Mandatory Security for Object-Oriented Database Systems, Proc. ACM OOPSLA (Object Oriented Programming Systems, Language, and Applications) Conf., New Orleans, October 1989.
-
(1989)
Proc. ACM OOPSLA (Object Oriented Programming Systems, Language, and Applications) Conf.
-
-
Thuraisingham, B.1
-
27
-
-
0026403732
-
Multilevel Security for Distributed Database Systems
-
Thuraisingham, B., Multilevel Security for Distributed Database Systems, Comput. Security, 10(9): 727–747, 1991.
-
(1991)
Comput. Security
, vol.10
, Issue.9
, pp. 727-747
-
-
Thuraisingham, B.1
-
28
-
-
0028730609
-
Multilevel Security for Federated Database Systems
-
Thuraisingham, B., Multilevel Security for Federated Database Systems, Comput. Security, 13(6): 509–525, 1994.
-
(1994)
Comput.
, vol.13
, Issue.6
, pp. 509-525
-
-
Thuraisingham, B.1
-
29
-
-
0003655816
-
-
CRC Press, Boca Raton, FL
-
Thuraisingham, B., Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, Boca Raton, FL, 1998.
-
(1998)
Data Mining: Technologies, Techniques, Tools and Trends
-
-
Thuraisingham, B.1
-
31
-
-
85051789757
-
-
V. Kumar et al., Eds., Kluwer, Dordrecht, The Netherlands
-
Thuraisingham, B., Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges, V. Kumar et al., Eds., Kluwer, Dordrecht, The Netherlands, 2004.
-
(2004)
Managing Threats to Web Databases and Cyber Systems
-
-
Thuraisingham, B.1
-
32
-
-
85055928403
-
-
AAAI (Association for Advancement of Artificial Intelligence) Press, MA
-
Kargupta, H., et al., Eds., Data Mining for Counter-Terrorism, Next Generation Data Mining, AAAI (Association for Advancement of Artificial Intelligence) Press, MA, 2004.
-
(2004)
Data Mining for Counter-Terrorism, Next Generation Data Mining
-
-
Kargupta, H.1
-
34
-
-
24644455920
-
Privacy constraint processing in a privacy enhanced database management system
-
Thuraisingham, B., Privacy constraint processing in a privacy enhanced database management system, Data Knowledge Eng. J., November 2005.
-
(2005)
Data Knowledge Eng. J.
-
-
Thuraisingham, B.1
-
35
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
-
(1993)
Data Knowledge Eng. J
, vol.11
, Issue.3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
36
-
-
0003969639
-
-
National Computer Security Center, Gaitherburg, MD
-
Trusted Network Interpretation, National Computer Security Center, Gaitherburg, MD, 1987.
-
(1987)
Trusted Network Interpretation
-
-
-
37
-
-
84954418287
-
-
IEEE Symposium on Security and Privacy, Oakland, CA
-
Yu, T. and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.
-
(2003)
A Unified Scheme for Resource Protection in Automated Trust Negotiation
-
-
Yu, T.1
Winslett, M.2
-
38
-
-
85055946182
-
-
ACM SIGMOD Record, 30(3), 2001.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.3
-
-
-
40
-
-
0003577150
-
-
John Wiley & Sons, New York
-
Berry, M. and G. Linoff, Data Mining Techniques for Marketing, Sales, and Customer Support, John Wiley & Sons, New York, 1997.
-
(1997)
Data Mining Techniques for Marketing, Sales, and Customer Support
-
-
Berry, M.1
Linoff, G.2
-
41
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E. et al., The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Security, 2(1), 1999.
-
(1999)
ACM Trans. Inf. Syst. Security
, vol.2
, Issue.1
-
-
Bertino, E.1
-
42
-
-
33646886776
-
Secure knowledge management
-
Bertino, E., L. Khan, R. Sandhu, and B. Thuraisingham, Secure knowledge management, IEEE Trans. Syst. Man Cybern., May 2006.
-
(2006)
IEEE Trans. Syst. Man Cybern.
-
-
Bertino, E.1
Khan, L.2
Sandhu, R.3
Thuraisingham, B.4
-
43
-
-
0003882648
-
-
McGraw- Hill, New York
-
Ceri, S. and G. Pelagatti, Distributed Databases, Principles and Systems, McGraw- Hill, New York, 1984.
-
(1984)
Distributed Databases, Principles and Systems
-
-
Ceri, S.1
Pelagatti, G.2
-
44
-
-
0014797273
-
A relational model of data for large shared data banks
-
Codd, E.F., A relational model of data for large shared data banks, Commn. ACM, 13(6), 1970.
-
(1970)
Commn.
, vol.13
, Issue.6
-
-
Codd, E.F.1
-
45
-
-
85055919969
-
Collaborative Computing
-
Collaborative Computing, IEEE Comput., 32 Special Issue (9), 1999.
-
(1999)
IEEE Comput
, vol.32
-
-
-
46
-
-
85055923726
-
Computer supported cooperative work
-
Special Issue, December
-
Computer supported cooperative work, Commn. ACM, Special Issue, December 1991.
-
(1991)
Commn. ACM
-
-
-
49
-
-
0008531833
-
-
IEEE Tutorial, IEEE Computer Society Press, Washington, D.C
-
Hurson, A. et al., Eds., Parallel Architectures for Databases, IEEE Tutorial, IEEE Computer Society Press, Washington, D.C., 1989.
-
(1989)
Parallel Architectures for Databases
-
-
Hurson, A.1
-
50
-
-
85055928935
-
-
Special Issue on Audio Mining
-
IEEE Comput. Magazine, Special Issue on Audio Mining, 36, 2003.
-
(2003)
IEEE Comput. Magazine
, vol.36
-
-
-
52
-
-
85055958193
-
-
Kdnuggets, www.kdn.com.
-
Kdnuggets
-
-
-
53
-
-
0003509852
-
-
MIT Press, Cambridge, MA
-
Morey, D., M. Maybury, and B. Thuraisingham, Eds., Knowledge Management, MIT Press, Cambridge, MA, 2001.
-
(2001)
Knowledge Management
-
-
Morey, D.1
Maybury, M.2
Thuraisingham, B.3
-
58
-
-
0003655816
-
-
CRC Press, Boca Raton, FL
-
Thuraisingham, B., Data Mining: Technologies, Techniques, Tools and Trends, CRC Press, Boca Raton, FL, 1998.
-
(1998)
Data Mining: Technologies, Techniques, Tools and Trends
-
-
Thuraisingham, B.1
-
61
-
-
85055813033
-
-
CRC Press, Boca Raton, FL
-
Thuraisingham, B., XML, Databases and the Semantic Web, CRC Press, Boca Raton, FL, 2002.
-
(2002)
XML, Databases and the Semantic Web
-
-
Thuraisingham, B.1
-
62
-
-
84992967091
-
Collaborative commerce and knowledge management
-
Thuraisingham, B. et al, Collaborative commerce and knowledge management, Knowledge Process. Manage. J., 9(1): 43–53, 2002.
-
(2002)
Knowledge Process. Manage. J.
, vol.9
, Issue.1
, pp. 43-53
-
-
Thuraisingham, B.1
-
66
-
-
0003469339
-
-
Computer Science Press, Rockville, MD
-
Ullman, J. D., Principles of Database and Knowledge Base Management Systems, Volumes 1 and 2, Computer Science Press, Rockville, MD, 1988.
-
(1988)
Principles of Database and Knowledge Base Management Systems
, vol.1-2
-
-
Ullman, J.D.1
-
67
-
-
6344266140
-
Mediators in the architecture of future information systems
-
Wiederhold, G., Mediators in the architecture of future information systems, IEEE Comput., March 1992.
-
(1992)
IEEE Comput.
-
-
Wiederhold, G.1
-
68
-
-
84976753050
-
An Object-Oriented Approach to Multimedia Databases
-
Washington, D.C
-
Woelk, D. et al., An Object-Oriented Approach to Multimedia Databases, Proc. ACM SIGMOD Conf., Washington, D.C., June 1986.
-
(1986)
Proc. ACM SIGMOD Conf
-
-
Woelk, D.1
-
69
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
70
-
-
85055918108
-
Secure third party publication of XML documents
-
Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., 10, 2004.
-
(2004)
IEEE
, vol.10
-
-
Bertino, E.1
-
73
-
-
0040802324
-
-
Springer-Verlag, Heidelberg
-
Lloyd, J., Logic Programming, Springer-Verlag, Heidelberg, 1987.
-
(1987)
Logic Programming
-
-
Lloyd, J.1
-
74
-
-
85055577827
-
-
Power Books, London, UK
-
St. Laurent, S., XML: A Primer, Power Books, London, UK, 2000.
-
(2000)
S., XML: A Primer
-
-
Laurent, S.T.1
-
76
-
-
85055924637
-
-
www.w3c.org.
-
-
-
-
77
-
-
0041783510
-
Privacy-preserving data mining
-
Dallas, TX
-
Agrawal, R. and R. Srikant, Privacy-preserving data mining, Proc. ACM SIGMOD Conf., Dallas, TX, May 2000.
-
(2000)
Proc. ACM SIGMOD
-
-
Agrawal, R.1
Srikant, R.2
-
78
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G., and F. Van Harmelen, A Semantic Web Primer, MIT Press, Cambridge, MA 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelen, F.2
-
80
-
-
0344559510
-
Access control for XML documents
-
Bertino, E. et al., Access control for XML documents, Data Knowledge Eng., 43(3), 2002.
-
(2002)
Data Knowledge Eng
, vol.43
, Issue.3
-
-
Bertino, E.1
-
81
-
-
85055918108
-
Secure third party publication of XML documents
-
Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge and Data Eng., 10, 2004.
-
(2004)
IEEE
, vol.10
-
-
Bertino, E.1
-
82
-
-
85055493211
-
Trust-based context aware access control models in Web services
-
San Diego
-
Bhatty R., E. Bertino, and A. Ghafoor, Trust-based context aware access control models in Web services, Proc. Web Services Conf., San Diego, July 2004.
-
(2004)
Proc. Web Services Conf.
-
-
Bhatty, R.1
Bertino, E.2
Ghafoor, A.3
-
84
-
-
84976766949
-
The entity relationships model—toward a unified view of data
-
Chen, P., The entity relationships model—toward a unified view of data, ACM Trans. Database Syst., 1, 1976.
-
(1976)
ACM
, vol.1
-
-
Chen, P.1
-
85
-
-
85055947683
-
-
(see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002)
-
Clifton, C., M. Kantarcioglu, and J. Vaidya, Defining Privacy for Data Mining, Purdue University, 2002 (see also Next Generation Data Mining Workshop, Baltimore, MD, November 2002).
-
(2002)
Defining Privacy for Data Mining, Purdue University
-
-
Clifton, C.1
Kantarcioglu, M.2
Vaidya, J.3
-
87
-
-
0242625281
-
Privacy preserving mining of association rules
-
Edmonton, Alberta, Canada
-
Evfimievski, A., R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, Proc. Eighth ACM SIGKDD Int. Conf. Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 2002.
-
(2002)
Proc. Eighth ACM SIGKDD Int. Conf. Knowledge Discovery
-
-
Evfimievski, A.1
Srikant, R.2
Agrawal, R.3
Gehrke, J.4
-
88
-
-
85055948699
-
Inference problem for the semantic Web
-
Colorado, August 2003, Kluwer, Dordrecht, The Netherlands
-
Farkas, C. et al., Inference problem for the semantic Web, Proc. IFIP Conf. Data Applications Security, Colorado, August 2003, Kluwer, Dordrecht, The Netherlands, 2004.
-
(2004)
Proc. IFIP Conf. Data
-
-
Farkas, C.1
-
90
-
-
10044250804
-
Research problems in data stream processing and privacy-preserving data mining
-
Baltimore, MD
-
Gehrke, J., Research problems in data stream processing and privacy-preserving data mining, Proc. Next Generation Data Mining Workshop, Baltimore, MD, November 2002.
-
(2002)
Proc. Next Generation Data Mining Workshop
-
-
Gehrke, J.1
-
91
-
-
0036204131
-
Providing database as a service
-
San Jose, CA
-
Hacigumus, H. et al., Providing database as a service, Proc. IEEE Data Engineering Conf., San Jose, CA, March 2002.
-
(2002)
Proc. IEEE Data Engineering
-
-
Hacigumus, H.1
-
92
-
-
85055921393
-
-
International Semantic Web Conference, Sanibel Island, FL
-
Kagal, L., T.W. Finin, and A. Joshi, A Policy Based Approach to Security for the Semantic Web, International Semantic Web Conference, Sanibel Island, FL, 2003.
-
(2003)
A Policy Based Approach to Security for the Semantic Web
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
95
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B. et al, Design and implementation of a database inference controller, Data Knowledge Eng. J. 11(3), 1993.
-
(1993)
Data Knowledge Eng. J
, vol.11
, Issue.3
-
-
Thuraisingham, B.1
-
96
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B., Security issues for federated database systems, Comput. Security, 13(6), 1994.
-
(1994)
Comput.
, vol.13
, Issue.6
-
-
Thuraisingham, B.1
-
100
-
-
85055224488
-
-
CRC Press, Boca Raton, FL
-
Thuraisingham, B., Web Data Mining and Applications in Business, Intelligence, and Counter-Terrorism, CRC Press, Boca Raton, FL, 2003.
-
(2003)
Web Data Mining and Applications in Business, Intelligence, and Counter-Terrorism
-
-
Thuraisingham, B.1
-
101
-
-
84997061532
-
Administering the semantic Web, confidentiality, privacy and trust
-
Thuraisingham, B. et al., Administering the semantic Web, confidentiality, privacy and trust, J. Inf. Security Privacy, 2006.
-
(2006)
J. Inf. Security Privacy
-
-
Thuraisingham, B.1
-
102
-
-
84954418287
-
A Unified Scheme for Resource Protection in Automated Trust Negotiation
-
Oakland, CA
-
Yu, T. and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA., May 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
103
-
-
85055958104
-
-
http://xml.apache.org/security/.
-
-
-
-
104
-
-
85055949965
-
-
http://www.w3.org/Signature/.
-
-
-
-
105
-
-
85055933817
-
-
http://www.w3.org/Encryption/2001/.
-
-
-
-
106
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
107
-
-
0344559510
-
Access control for XML documents
-
Bertino, E. et al., Access control for XML documents, Data Knowledge Eng., 43(3), 2002.
-
(2002)
Data Knowledge Eng
, vol.43
, Issue.3
-
-
Bertino, E.1
-
108
-
-
33745205316
-
Secure third party publication of XML documents
-
Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., October 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng.
-
-
Bertino, E.1
-
109
-
-
85055933932
-
-
Organization for the Advancement of Structured Information Standards. http://www.oasis-open.org/home/index.php.
-
-
-
-
110
-
-
0012325099
-
-
CRC Press, Boca Raton, FL
-
Thuraisingham, B., XML, Databases and the Semantic Web, CRC Press, Boca Raton, FL, 2001.
-
(2001)
XML, Databases and the Semantic Web
-
-
Thuraisingham, B.1
-
112
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
115
-
-
0242276201
-
-
International Semantic Web Conference
-
Kagal, L., T.W. Finin, and A. Joshi, A Policy Based Approach to Security for the Semantic Web, International Semantic Web Conference, 2003, 402–418.
-
(2003)
A Policy Based Approach to Security for the Semantic Web
, pp. 402-418
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
116
-
-
3142523603
-
The UCONABC usage control model
-
Park, J. and R.S. Sandhu, The UCONABC usage control model, ACM Trans. Inf. Syst. Secur., 7(1), 128–174, 2004.
-
(2004)
ACM Trans. Inf.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.S.2
-
117
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., E. Coyne, H. Feinstein, and C. Youman, Role-based access control models, IEEE Comput., 29(2), February 1996.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
119
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
123
-
-
10044293324
-
Security standards for the semantic Web
-
Thuraisingham, B., Security standards for the semantic Web, Comput. Stand. Interface J., 2005.
-
(2005)
Comput. Stand.
-
-
Thuraisingham, B.1
-
124
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
126
-
-
85055930420
-
-
International Semantic Web Conference, Sanibel Island, FL
-
Kagal, L., T.W. Finin, and A. Joshi, A Policy Based Approach to Security for the Semantic Web, International Semantic Web Conference, Sanibel Island, FL, 2003.
-
(2003)
A Policy Based Approach to Security for the Semantic Web
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
127
-
-
0040802324
-
-
Springer-Verlag, Heidelberg
-
Lloyd, J., Logic Programming, Springer-Verlag, Heidelberg, 1987.
-
(1987)
Logic Programming
-
-
Lloyd, J.1
-
128
-
-
33747486880
-
A nonmonotonic typed multilevel logic for secure data and knowledge base management systems
-
Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems, Proc. Comput. Security Foundations Workshop, 1991.
-
(1991)
Proc. Comput. Security Foundations Workshop
-
-
Thuraisingham, B.1
-
129
-
-
85055933889
-
A nonmonotonic typed multilevel logic for secure data and knowledge base management systems-II
-
Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems-II, Proc. Comput. Security Foundations Workshop, 1992.
-
(1992)
Proc. Comput. Security Foundations Workshop
-
-
Thuraisingham, B.1
-
130
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
-
(1993)
Data Knowledge Eng. J
, vol.11
, Issue.3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
131
-
-
85055937211
-
-
www.w3c.org.
-
-
-
-
132
-
-
35248839311
-
Trust-Chi: An XML framework for trust negotiations
-
Bertino, E., E. Ferrari, and A.C. Squicciarini, Trust-Chi: an XML framework for trust negotiations, Commun. Multimedia Security, 2003, 146-157.
-
(2003)
Commun. Multimedia Security
, pp. 146-157
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
133
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
Bertino, E., E. Ferrari, and A.C. Squicciarini, Trust-X: a peer-to-peer framework for trust establishment, IEEE Trans. Knowledge Data Eng. 2004, 16(7): 827-842.
-
(2004)
IEEE Trans. Knowledge Data Eng.
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
134
-
-
85055946665
-
-
http://en.wikipedia.org/wiki/Digital_Rights_Management.
-
-
-
-
135
-
-
85055951006
-
-
Montpellier, France
-
García, R. and R. Gil, An OWL Copyright Ontology for Semantic Digital Rights Management, Workshop on Ontology Content and Evaluation in Enterprise, Montpellier, France, 2006.
-
(2006)
An OWL Copyright Ontology for Semantic Digital Rights Management, Workshop on Ontology Content and Evaluation in Enterprise
-
-
García, R.1
Gil, R.2
-
136
-
-
85055920459
-
-
Hawaii International Conference on Systems Sciences, Big Island, HI, Jan. 6–9
-
Gefen, D. et al., The Conceptualization of Trust and Risk and Their Relationship in Electronic Commerce, Hawaii International Conference on Systems Sciences, Big Island, HI, Jan. 6–9, 2003.
-
(2003)
The Conceptualization of Trust and Risk and Their Relationship in Electronic Commerce
-
-
Gefen, D.1
-
137
-
-
31744441264
-
Trust networks on the semantic Web
-
Helsinki, Finland
-
Golbeck, J., B. Parsia, and J. Hendler, Trust networks on the semantic Web, Proc. Cooperative Inf. Agents, August 27-29, 2003, Helsinki, Finland.
-
(2003)
Proc.
-
-
Golbeck, J.1
Parsia, B.2
Hendler, J.3
-
138
-
-
0242276201
-
A policy based approach to security for the semantic Web
-
Sanibel Island, Florida
-
Kagal, L., T. Finin, and A. Joshi, A policy based approach to security for the semantic Web, Proc. Second Int. Semantic Web Conf., Sanibel Island, Florida, 2003, 402-418.
-
(2003)
Proc. Second Int. Semantic Web Conf.
, pp. 402-418
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
139
-
-
85055947128
-
-
Technical Report, The University of Texas at Dallas
-
Kantarcioglu, M. et al., Risk-based Access Control, Technical Report, The University of Texas at Dallas, 2006.
-
(2006)
Risk-Based Access Control
-
-
Kantarcioglu, M.1
-
141
-
-
8444247238
-
Trust management for the semantic Web
-
Sanibel Island, Florida
-
Richardson, M., R. Agrawal, and P. Domingos, Trust management for the semantic Web, Proc. Second Int. Semantic Web Conf., Sanibel Island, Florida, 2003.
-
(2003)
Proc. Second Int. Semantic Web Conf
-
-
Richardson, M.1
Agrawal, R.2
Domingos, P.3
-
143
-
-
32844474610
-
Achieving privacy in trust negotiations with an ontology-based approach
-
Squicciarini, A.C., E. Bertino, E. Ferrari, and I. Ray, Achieving privacy in trust negotiations with an ontology-based approach, IEEE Trans. Dependable Sec. Comput. 2006, 3(1): 13-30.
-
(2006)
IEEE Trans. Dependable Sec. Comput.
, vol.3
, Issue.1
, pp. 13-30
-
-
Squicciarini, A.C.1
Bertino, E.2
Ferrari, E.3
Ray, I.4
-
144
-
-
3543128965
-
-
IEEE Symposium on Security and Privacy, Oakland, CA
-
Winsborough, W.H. and N. Li, Safety in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA, 2004.
-
(2004)
Safety in Automated Trust Negotiation
-
-
Winsborough, W.H.1
Li, N.2
-
145
-
-
0038148412
-
-
IEEE Symposium on Security and Privacy, Oakland, CA
-
Yu, T. and M. Winslett, A Unified Scheme for Resource Protection in Automated Trust Negotiation, IEEE Symposium on Security and Privacy, Oakland, CA, 2003, 110-122.
-
(2003)
A Unified Scheme for Resource Protection in Automated Trust Negotiation
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
147
-
-
85055918831
-
-
Sage Publications, Thousand Oaks, CA
-
Bainbridge, W., Privacy, Encyclopedia of Community, Sage Publications, Thousand Oaks, CA, 2003.
-
(2003)
Privacy, Encyclopedia of Community
-
-
Bainbridge, W.1
-
148
-
-
0242276201
-
-
International Semantic Web Conference
-
Kaga, L., T.W. Finin, and A. Joshi, A Policy Based Approach to Security for the Semantic Web, International Semantic Web Conference, 2003, 402–418.
-
(2003)
A Policy Based Approach to Security for the Semantic Web
, pp. 402-418
-
-
Kaga, L.1
Finin, T.W.2
Joshi, A.3
-
150
-
-
34547505017
-
PPTrust- X A system for privacy preserving trust negotiations
-
Squicciarini, A.C., E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham. PPTrust- X A system for privacy preserving trust negotiations. ACM TISSEC Tran. Syst. Info. Secur., 10, 2007.
-
(2007)
ACM TISSEC Tran. Syst.
, vol.10
-
-
Squicciarini, A.C.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
151
-
-
84995288300
-
Navigating computer science research through waves of privacy concerns: Discussions among computer scientists at Carnegie Mellon University
-
Sweeney, L., Navigating computer science research through waves of privacy concerns: discussions among computer scientists at Carnegie Mellon University, ACM Comput. Soc., 34, 2004.
-
(2004)
ACM Comput. Soc.
, pp. 34
-
-
Sweeney, L.1
-
152
-
-
85055956936
-
-
Computer Security Foundations Workshop, (also Technical Report, The MITRE Corporation MTP-291)
-
Thuraisingham, B., Recurison Theoretic Complexity of the Inference Problem, Computer Security Foundations Workshop, 1990 (also Technical Report, The MITRE Corporation MTP-291).
-
(1990)
Recurison Theoretic Complexity of the Inference Problem
-
-
Thuraisingham, B.1
-
153
-
-
0029290760
-
Security constraint processing in a multilevel distributed database management system
-
Thuraisingham, B. and W. Ford, Security constraint processing in a multilevel distributed database management system, IEEE Trans. Knowledge Data Eng., 7, 1995.
-
(1995)
IEEE Trans. Knowledge Data Eng.
, vol.7
-
-
Thuraisingham, B.1
Ford, W.2
-
155
-
-
84997061532
-
Administering the semantic Web, confidentiality, privacy and trust
-
Thuraisingham, B. et al., Administering the semantic Web, confidentiality, privacy and trust, J. Inf. Security Privacy, 2006.
-
(2006)
J. Inf. Security Privacy
-
-
Thuraisingham, B.1
-
159
-
-
85055921687
-
Secure third party publication of XML documents, IEEE
-
Bertino, E. et al., Secure third party publication of XML documents, IEEE Trans. Knowledge Data Eng., 10, 2004.
-
(2004)
Trans. Knowledge Data Eng.
, vol.10
-
-
Bertino, E.1
-
165
-
-
0025065653
-
Polyinstantiation integrity in multilevel relations
-
Oakland, CA
-
Jajodia, S. and R. Sandhu, Polyinstantiation integrity in multilevel relations, Proc. IEEE Symp. Security Privacy, Oakland, CA, April 1990.
-
(1990)
Proc. IEEE Symp. Security Privacy
-
-
Jajodia, S.1
Sandhu, R.2
-
166
-
-
85055954264
-
Concurrency control for trusted database management system
-
Ko, H. and B. Thuraisingham, Concurrency control for trusted database management system, ACM SIGMOD Record, December 1993.
-
(1993)
ACM SIGMOD Record
-
-
Ko, H.1
Thuraisingham, B.2
-
167
-
-
0041491441
-
DAML+OIL: An ontology language for the semantic Web
-
McGuiness, D. et al., DAML+OIL: An ontology language for the semantic Web, IEEE Intelligent Syst., 17, 2002.
-
(2002)
IEEE Intelligent Syst.
, vol.17
-
-
McGuiness, D.1
-
168
-
-
0025447566
-
Design of LDV: A multilevel secure relational database management system
-
Stachour, P. and B. Thuraisingham, Design of LDV: A multilevel secure relational database management system, IEEE Trans. Knowledge Data Eng., 2(2), 1990.
-
(1990)
IEEE Trans. Knowledge Data Eng
, vol.2
, Issue.2
-
-
Stachour, P.1
Thuraisingham, B.2
-
169
-
-
85055918719
-
-
presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, (also available as MITRE technical Paper MTP291 June 1990)
-
Thuraisingham, B., Recursion Theoretic Properties of the Inference Problem, presented at the IEEE Computer Security Foundations Workshop, Franconia, NH, June 1990 (also available as MITRE technical Paper MTP291 June 1990).
-
(1990)
Recursion Theoretic Properties of the Inference Problem
-
-
Thuraisingham, B.1
-
170
-
-
10444228465
-
The use of conceptual structures to handle the inference problem
-
Shepherdstown, WV
-
Thuraisingham, B., The use of conceptual structures to handle the inference problem, Proc. IFIP Database Security Conf., Shepherdstown, WV, 1991.
-
(1991)
Proc. IFIP Database Security Conf
-
-
Thuraisingham, B.1
-
171
-
-
33747486880
-
A Nonmonotonic Typed Multilevel Logic for Secure Data and Knowledge Base Management Systems
-
Franconia, NH
-
Thuraisingham, B., A Nonmonotonic Typed Multilevel Logic for Secure Data and Knowledge Base Management Systems, Proc. Comput. Security Found. Workshop, Franconia, NH, 1991.
-
(1991)
Proc. Comput. Security Found. Workshop
-
-
Thuraisingham, B.1
-
172
-
-
85052688206
-
Towards the design of a standard multilevel relational data model
-
Thuraisingham, B., Towards the design of a standard multilevel relational data model, Comp. Stand. Interface J., 1993.
-
(1993)
Comp. Stand. Interface J.
-
-
Thuraisingham, B.1
-
174
-
-
0003469339
-
-
Computer Science Press, Rockville, MD
-
Ullman, J.D., Principles of Database and Knowledge Base Management Systems, Volumes 1 and 2, Computer Science Press, Rockville, MD, 1988.
-
(1988)
Principles of Database and Knowledge Base Management Systems
, vol.1-2
-
-
Ullman, J.D.1
-
175
-
-
85055571738
-
On the problem of security in data bases
-
Monterey, CA
-
Simon, W., On the problem of security in data bases, Proc. IFIP Database Security Conf., Monterey, CA, 1989.
-
(1989)
Proc. IFIP Database Security
-
-
Simon, W.1
-
176
-
-
14744288931
-
-
MIT Press, Cambridge, MA
-
Antoniou, G. and F. van Harmelan, A Semantic Web Primer, MIT Press, Cambridge, MA, 2003.
-
(2003)
A Semantic Web Primer
-
-
Antoniou, G.1
Van Harmelan, F.2
-
177
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
Yorktown Heights, NY, June
-
Becker, M.Y. and P. Sewell, Cassandra: distributed access control policies with tunable expressiveness, in 5th IEEE Intern. Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, June 2004.
-
(2004)
5Th IEEE Intern. Workshop on Policies for Distributed Systems and Networks
-
-
Becker, M.Y.1
Sewell, P.2
-
178
-
-
0001071507
-
Compliance checking in the policymaker trust management system
-
Anguilla, British West Indies, February
-
Blaze, M., J. Feigenbaum, and M. Strauss, Compliance checking in the policymaker trust management system, in Proc. 2nd Conf. Financial Cryptography, Anguilla, British West Indies, February 1998.
-
(1998)
Proc. 2Nd Conf. Financial Cryptography
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
179
-
-
33646036095
-
-
Technical Report, Working Group I2, EU NoE REWERSE
-
Bonatti, P.A., N. Shahmehri, C. Duma, D. Olmedilla, W. Nejdl, M. Baldoni, C. Baroglio, A. Martelli, V. Patti, P. Coraggio, G. Antoniou, J. Peer, and N.E. Fuchs, Rule-Based Policy Specification: State of the Art and Future Work. Technical Report, Working Group I2, EU NoE REWERSE, 2004. http://rewerse.net/deliverables/i2-d1.pdf.
-
(2004)
Rule-Based Policy Specification: State of the Art and Future Work
-
-
Bonatti, P.A.1
Shahmehri, N.2
Duma, C.3
Olmedilla, D.4
Nejdl, W.5
Baldoni, M.6
Baroglio, C.7
Martelli, A.8
Patti, V.9
Coraggio, P.10
Antoniou, G.11
Peer, J.12
Fuchs, N.E.13
-
180
-
-
33746103325
-
-
Technical Report, I2-D4, Working Group I2, EU NoE REWERSE
-
Bonatti, P.A., D. Olmedilla, and J. Peer, Advanced Policy Queries. Technical Report, I2-D4, Working Group I2, EU NoE REWERSE, 2005. http://www.rewerse.net.
-
(2005)
Advanced Policy Queries
-
-
Bonatti, P.A.1
Olmedilla, D.2
Peer, J.3
-
181
-
-
33746056431
-
-
European Semantic Web Conference (ESWC), Budva, Montenegro
-
Bonatti, P.A., C. Duma, N.E. Fuchs, W. Nejdl, D. Olmedilla, J. Peer, and N. Shahmehri, Semantic Web policies-a discussion of requirements and research issues, European Semantic Web Conference (ESWC), Budva, Montenegro, 712-724, 2006.
-
(2006)
Semantic Web Policies-A Discussion of Requirements and Research Issues
, pp. 712-724
-
-
Bonatti, P.A.1
Duma, C.2
Fuchs, N.E.3
Nejdl, W.4
Olmedilla, D.5
Peer, J.6
Shahmehri, N.7
-
182
-
-
33747486880
-
A nonmonotonic typed multilevel logic for secure data and knowledge base management systems
-
Franconia, NH
-
Thuraisingham, B., A nonmonotonic typed multilevel logic for secure data and knowledge base management systems, Proc. Comp. Security Found. Workshop, Franconia, NH, 1991.
-
(1991)
Proc. Comp. Security Found. Workshop
-
-
Thuraisingham, B.1
-
183
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B., Security issues for federated database systems, Comp. Security, 13(6), 1994.
-
(1994)
Comp. Security
, vol.13
, Issue.6
-
-
Thuraisingham, B.1
-
185
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
Bertino E. et al., GEO-RBAC: a spatially aware RBAC, Proc. Symp. Access Control Models, Applications and Technologies (SACMAT), 2005.
-
(2005)
Proc. Symp. Access Control
-
-
Bertino, E.1
-
187
-
-
10044272304
-
-
DEXA Workshops, Zaragoza, Spain
-
Carminati, B., E.A. Ferrari, and B.M. Thuraisingham, Using RDF for Policy Specification and Enforcement, DEXA Workshops 2004, Zaragoza, Spain, 163-167.
-
(2004)
Using RDF for Policy Specification and Enforcement
, pp. 163-167
-
-
Carminati, B.1
Ferrari, E.A.2
Thuraisingham, B.M.3
-
188
-
-
85055942202
-
-
GEO-XACML, http://www.geoxacml.org/.
-
GEO-XACML
-
-
-
191
-
-
27344443995
-
A semantic Web services architecture
-
Burstein, M., C. Bussler, M. Zaremba, T. Finin, M.N. Huhns, M. Paolucci, A.P. Sheth, and S. Williams, A semantic Web services architecture, IEEE Internet Comp., September-October, 2005.
-
(2005)
IEEE Internet
-
-
Burstein, M.1
Bussler, C.2
Zaremba, M.3
Finin, T.4
Huhns, M.N.5
Paolucci, M.6
Sheth, A.P.7
Williams, S.8
-
192
-
-
85055956720
-
-
OASIS: http://www.oasis-open.org/home/index.php.
-
OASIS
-
-
-
193
-
-
85055943318
-
-
www.omg.org.
-
-
-
-
194
-
-
85055935177
-
-
OpenSAML: http://www.opensaml.org/.
-
Opensaml
-
-
-
195
-
-
85055942119
-
-
Shibboleth, http://middleware.internet2.edu/pki05/proceedings/chadwick-distributed-shibboleth.pdf.
-
-
-
-
196
-
-
85055936159
-
-
http://en.wikipedia.org/wiki/Service-oriented_architecture.
-
-
-
-
197
-
-
85055932301
-
-
www.terena.nl/activities/tf-aace/workshop/presentations/Distributed_trust_model1.ppt.
-
-
-
-
200
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E. et al., The specification and enforcement of authorization constraints in workflow management systems, ACM Trans. Inf. Syst. Security, 2(1), 1999.
-
(1999)
ACM Trans. Inf. Syst. Security
, vol.2
, Issue.1
-
-
Bertino, E.1
-
202
-
-
85055941393
-
-
Knowledge Acquisition Modelling and Acquisition Workshop, Whittlebury Hall, UK
-
Chen-Burger, Y.H, K.Y. Hui, A.D. Preece, P.M.D. Gray, and A. Tate, Supporting Collaboration through Semantic-based Workflow and Constraint Solving, Knowledge Acquisition Modelling and Acquisition Workshop, Whittlebury Hall, UK, October 2004.
-
(2004)
Supporting Collaboration through Semantic-Based Workflow and Constraint Solving
-
-
Chen-Burger, Y.H.1
Hui, K.Y.2
Preece, A.D.3
Gray, P.M.D.4
Tate, A.5
-
203
-
-
85055956256
-
Security for collaborative computer systems, multimedia review
-
Demurjian, S. et al., Security for collaborative computer systems, multimedia review, J. Multimedia Comput., 5, Summer 1993.
-
(1993)
J. Multimedia Comput
, vol.5
-
-
Demurjian, S.1
-
204
-
-
85055482745
-
Analyzing the safety of workflow authorization models
-
Chalidiki, Greece, July 1998, Kluwer, Dordrecht
-
Huang, W. and V. Atluri, Analyzing the safety of workflow authorization models, Proc. IFIP Database Security Conf., Chalidiki, Greece, July 1998, Kluwer, Dordrecht, 1999.
-
(1999)
Proc. IFIP Database Security Conf
-
-
Huang, W.1
Atluri, V.2
-
205
-
-
85055929621
-
-
http://xml.coverpages.org/wf-xml.html.http://www.csd.abdn.ac.uk/~apreece/research/download/ekaw2004.pdf.
-
-
-
-
207
-
-
0003509852
-
-
MIT Press, Cambridge, MA
-
Morey, D., M. Maybury, and B. Thuraisingham, Eds., Knowledge Management, MIT Press, Cambridge, MA, 2001.
-
(2001)
Knowledge Management
-
-
Morey, D.1
Maybury, M.2
Thuraisingham, B.3
-
209
-
-
33947244773
-
Security for multimedia database systems
-
Halifax, UK
-
Thuraisingham, B., Security for multimedia database systems, Proc. IFIP Data Security Conf., Halifax, UK, 1990.
-
(1990)
Proc. IFIP Data
-
-
Thuraisingham, B.1
-
211
-
-
32944456462
-
Knowledge management and the semantic Web: From scenario to technology
-
Warren, P., Knowledge management and the semantic Web: from scenario to technology, IEEE Intelligent Sys., 21(1), 53–59, 2006.
-
(2006)
IEEE Intelligent Sys.
, vol.21
, Issue.1
, pp. 53-59
-
-
Warren, P.1
-
212
-
-
0027313815
-
A Model of atomicity for multilevel transactions
-
Oakland, California
-
Blaustein, B., A Model of atomicity for multilevel transactions, Proc. IEEE Symp. Security and Privacy, Oakland, California, May 1993.
-
(1993)
Proc. IEEE
-
-
Blaustein, B.1
-
213
-
-
84870967868
-
Availability policies in an adversarial environment
-
Lake Arrowhead, CA
-
Hosmer, H., Availability policies in an adversarial environment, Proc. New Comput. Security Paradigms Workshop, Lake Arrowhead, CA, Sept. 1996.
-
(1996)
Proc. New
-
-
Hosmer, H.1
-
214
-
-
85055466776
-
Integrating concurrency control and commit algorithms in distributed multilevel secure databases
-
Huntsville, Alabama, 1993. North-Holland, Amsterdam
-
Jajodia, S. et al, Integrating concurrency control and commit algorithms in distributed multilevel secure databases, Proc. IFIP Database Security, Huntsville, Alabama, 1993. North-Holland, Amsterdam, 1994.
-
(1994)
Proc. IFIP Database Security
-
-
Jajodia, S.1
-
215
-
-
85055946349
-
Integrity constraints in federated databases
-
Como, Italy
-
Olivier, M., Integrity constraints in federated databases, Proc. IFIP Database Security Conference, Como, Italy 1996.
-
(1996)
Proc. IFIP Database
-
-
Olivier, M.1
-
217
-
-
0026403732
-
Multilevel security issues in distributed database management systems – II
-
Thuraisingham, B., Multilevel security issues in distributed database management systems – II, Comput. Security, 10(9), 1991.
-
(1991)
Comput. Security
, vol.10
, Issue.9
-
-
Thuraisingham, B.1
-
218
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B., Security issues for federated database systems, Comput. Security, 13(6), 1994.
-
(1994)
Comput.
, vol.13
, Issue.6
-
-
Thuraisingham, B.1
-
220
-
-
0342296051
-
Multilevel security issues for distributed database management systems-III
-
Thuraisingham, B. and Rubinovitz, H., Multilevel security issues for distributed database management systems-III, Comput. Security, 11(7), 1992.
-
(1992)
Comput. Security
, vol.11
, Issue.7
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
221
-
-
85055510860
-
Security Constraint Processing in a Heterogeneous Database System
-
Thuraisingham, B. and H. Rubinovitz, Security Constraint Processing in a Heterogeneous Database System, Proc. ACM Comput. Conf., Phoenix, AZ, March 1994.
-
(1994)
Proc. ACM Comput. Conf
-
-
Thuraisingham, B.1
Rubinovitz, H.2
-
222
-
-
77954694081
-
Secure supply-chain protocols
-
Newport Beach, CA
-
Atallah, M., et al, Secure supply-chain protocols, Proc. Int. Conf. Electronic Commerce, Newport Beach, CA, 2003.
-
(2003)
Proc. Int. Conf. Electronic
-
-
Atallah, M.1
-
223
-
-
85055931565
-
-
eBXML, http://en.wikipedia.org/wiki/EbXML.
-
-
-
-
225
-
-
85055949231
-
-
http://istresults.cordis.lu/index.cfm/section/news/tpl/article/ID/78390/BrowsingType/Features.
-
-
-
-
226
-
-
85055947611
-
-
http://www.semantic-Web.at/57.219.219.press.ontologies-for-e-business.htm.
-
-
-
-
227
-
-
84904258786
-
A fair-exchange E-commerce protocol with automated dispute resolution
-
Amsterdam, The Netherlands, August 2000, Kluwer, Dordrecht
-
Ray, I. et al., A fair-exchange E-commerce protocol with automated dispute resolution, Proc. IFIP Database Security Conf., Amsterdam, The Netherlands, August 2000, Kluwer, Dordrecht, 2001.
-
(2001)
Proc. IFIP Database Security Conf
-
-
Ray, I.1
-
228
-
-
84942786976
-
A Language for modeling secure business transactions
-
Phoenix, AZ
-
Röhm, A.W., G. Herrmann, and Pernul, G., A Language for modeling secure business transactions, Proc. Comput. Security Applications Conf., ACSAC, Phoenix, AZ, Dec. 1999.
-
(1999)
Proc. Comput. Security Applications Conf., ACSAC
-
-
Röhm, A.W.1
Herrmann, G.2
Pernul, G.3
-
229
-
-
33646894100
-
Semantic information assurance for secure distributed knowledge management: A business process perspective
-
Singh, R. and A.F. Salam, Semantic information assurance for secure distributed knowledge management: a business process perspective, IEEE Tran. Syst. Man Cybernetics, May 2006.
-
(2006)
IEEE Tran. Syst. Man Cybernetics
-
-
Singh, R.1
Salam, A.F.2
-
231
-
-
33745183328
-
Security and privacy for semantic E-business, Commn
-
Thuraisingham, B. Security and privacy for semantic E-business, Commn. Assoc. Comput. Machinery, 48(12): 71–73, 2005.
-
(2005)
Assoc. Comput. Machinery
, vol.48
, Issue.12
, pp. 71-73
-
-
Thuraisingham, B.1
-
234
-
-
85055951842
-
National Academy of Sciences Study Report
-
National Academy Press, Washington, D.C
-
National Academy of Sciences Study Report, Protecting Children from Inappropriate Content on the Internet, National Academy Press, Washington, D.C., 2002.
-
(2002)
Protecting Children from Inappropriate Content on the Internet
-
-
-
235
-
-
0030216932
-
An authorization model for a distributed hypertext system
-
Samarati, P. et al., An authorization model for a distributed hypertext system, IEEE Trans. Knowledge Data Eng., 8(4), 1996.
-
(1996)
IEEE Trans. Knowledge Data Eng
, vol.8
, Issue.4
-
-
Samarati, P.1
-
236
-
-
84877931252
-
-
Technical Report, University of Karlsruhe, Germany
-
Sure, Y. and R. Studer, Semantic Web Technologies for Digital Libraries, Technical Report, University of Karlsruhe, Germany, 2005.
-
(2005)
Semantic Web Technologies for Digital Libraries
-
-
Sure, Y.1
Studer, R.2
-
238
-
-
0027853601
-
Design and implementation of a database inference controller
-
Thuraisingham, B., W. Ford, and M. Collins, Design and implementation of a database inference controller, Data Knowledge Eng. J., 11(3), 1993.
-
(1993)
Data Knowledge Eng. J
, vol.11
, Issue.3
-
-
Thuraisingham, B.1
Ford, W.2
Collins, M.3
-
239
-
-
85055953638
-
-
Technical Report, University of Texas at Dallas
-
Ashraful, A., G. Subbiah, L. Khan, and B. Thuraisingham, Geospatial Semantic Web, Technical Report, University of Texas at Dallas, 2006.
-
(2006)
Geospatial Semantic Web
-
-
Ashraful, A.1
Subbiah, G.2
Khan, L.3
Thuraisingham, B.4
-
240
-
-
33751055231
-
Dependable and secure TMO scheme
-
Gyeongju, Korea
-
Kim, J. and B. Thuraisingham, Dependable and secure TMO scheme, Proc. IEEE ISORC Conf., Gyeongju, Korea, April 2006.
-
(2006)
Proc. IEEE
-
-
Kim, J.1
Thuraisingham, B.2
-
241
-
-
85055928605
-
Self-protecting objects in a secure federated database
-
New York
-
Olivier, M.S., Self-protecting objects in a secure federated database, Proc. IFIP Database Security Conf., New York, August 1995.
-
(1995)
Proc. IFIP
-
-
Olivier, M.S.1
-
242
-
-
3142523603
-
The UCONABC usage control model, ACM Trans. Inf
-
Park, J. and R.S. Sandhu, The UCONABC usage control model, ACM Trans. Inf. Syst. Secur., 7(1): 128-174, 2004.
-
(2004)
Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.S.2
-
243
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., E. Coyne, H. Feinstein, and C. Youman, Role-based access control models, IEEE Computer, 29(2), February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
244
-
-
0003037838
-
An adaptive policy for improved timeliness in secure database systems
-
New York
-
Son, S., R. David, and B. Thuraisingham, An adaptive policy for improved timeliness in secure database systems, Proc.e 9th IFIP Working Conf. Database Security, New York, August 1995.
-
(1995)
Proc.E 9Th IFIP Working Conf. Database Security
-
-
Son, S.1
David, R.2
Thuraisingham, B.3
-
245
-
-
85055921031
-
Novel approaches to the inference problem
-
Thuraisingham, B., Novel approaches to the inference problem, Proc. 3rd RADC (Rome Air Development Center) Database Security Workshop, New York, June 1990.
-
(1990)
Proc. 3Rd
-
-
Thuraisingham, B.1
-
246
-
-
0028730609
-
Security issues for federated database systems
-
Thuraisingham, B., Security issues for federated database systems, Comput. Security, December 1994.
-
(1994)
Comput.
-
-
Thuraisingham, B.1
-
248
-
-
85055926525
-
Standards for secure data sharing across organizations
-
Thuraisingham, B., D. Harris, L. Khan, and R. Paul, Standards for secure data sharing across organizations, Comput. Standards Interfaces J., 2005.
-
(2005)
Comput. Standards Interfaces J.
-
-
Thuraisingham, B.1
Harris, D.2
Khan, L.3
Paul, R.4
-
249
-
-
85055926054
-
-
Technical Report, University of Texas at Dallas, March 2006. Int. J. Inf. Security Privacy
-
N. Tsyblinik, B. Thuraisingham, and A. Ashraful, CPT: Confidentiality, privacy and trust for the semantic Web, UTDCS-06-06, Technical Report, University of Texas at Dallas, March 2006. Int. J. Inf. Security Privacy, 1, 2006.
-
(2006)
CPT: Confidentiality, Privacy and Trust for the Semantic Web, UTDCS-06-06
, pp. 1
-
-
Tsyblinik, N.1
Thuraisingham, B.2
Ashraful, A.3
-
250
-
-
33644682591
-
-
Markle Report, Markle Foundation Publications, New York
-
Vatis, M., Ed., Creating a Trusted Network for Homeland Security, Markle Report, Markle Foundation Publications, New York, 2003.
-
(2003)
Creating a Trusted Network for Homeland Security
-
-
Vatis, M.1
-
251
-
-
85055930811
-
-
Technical Report, Tufts University, Boston, MA
-
Borden, J., XML Healthcare: from ASTM XML DTDs to the Semantic Web, Technical Report, Tufts University, Boston, MA, 2001.
-
(2001)
XML Healthcare: From ASTM XML Dtds to the Semantic Web
-
-
Borden, J.1
-
252
-
-
85055932239
-
-
Castells, P., B. Foncillas, R. Lara, M. Rico, J.L. Alonso, Semantic Web technologies for economic and financial information management, http://nets.ii.uam.es/aniceto/publications/esws04.pdf.
-
Semantic Web Technologies for Economic and Financial Information Management
-
-
Castells, P.1
Foncillas, B.2
Lara, R.3
Rico, M.4
Alonso, J.L.5
-
255
-
-
77958565948
-
-
Paliwal, A.V., N. Adam, C. Bornhövd, and J. Schaper, Semantic discovery and composition of Web services for RFID applications in border control, http://www.dvs1.informatik.tu-darmstadt.de/staff/bornhoevd/ISWC’04.pdf.
-
Semantic Discovery and Composition of Web Services for RFID Applications in Border Control
-
-
Paliwal, A.V.1
Adam, N.2
Bornhövd, C.3
Schaper, J.4
-
256
-
-
85055934289
-
-
Wiley Interscience, New York
-
Schulze-Kremer, S., and B. Smith, Encyclopedia of Genetics, Genomics, Proteomics and Bioinformatics, Part 4. Bioinformatics, Wiley Interscience, New York.
-
Encyclopedia of Genetics, Genomics, Proteomics
-
-
Schulze-Kremer, S.1
Smith, B.2
-
261
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
Damiani, M.L., E. Bertino, B. Catania, and P. Perlasca, GEO-RBAC: A spatially aware RBAC, ACM Trans. Inf. Syst. Secur., 10(1), 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur
, vol.10
, Issue.1
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
262
-
-
85055945238
-
Geospatial data mining
-
New Brunswick, NJ
-
Li, C. et al., Geospatial data mining, Proc. ISI Conf., New Brunswick, NJ, 2007.
-
(2007)
Proc. ISI Conf
-
-
Li, C.1
-
265
-
-
0029290760
-
Security constraint processing in a multilevel distributed database management
-
Thuraisingham, B. and W. Ford, Security constraint processing in a multilevel distributed database management, IEEE Trans. Knowledge Data Eng., April 1995.
-
(1995)
IEEE Trans. Knowledge Data Eng.
-
-
Thuraisingham, B.1
Ford, W.2
-
266
-
-
85055950861
-
-
Technical Report, University of Texas at Dallas
-
Thuraisingham, B. et al., DAGIS Architecture, Technical Report, University of Texas at Dallas, 2007.
-
(2007)
DAGIS Architecture
-
-
Thuraisingham, B.1
-
268
-
-
85012180694
-
Operator Scheduling in a Data Stream Manager
-
Berlin, Germany
-
Carney, D. et al., Operator Scheduling in a Data Stream Manager, Proc. 29th Int. Conf. Very Large Data Bases, Berlin, Germany, 2003.
-
(2003)
Proc. 29Th
-
-
Carney, D.1
-
273
-
-
85055532478
-
Security Issues in Mobile Database Access
-
Chalcidici, Greece, July 1998, Kluwer, Dordrecht
-
Lubinski, A., Security Issues in Mobile Database Access, Proc. IFIP Database Security Conf., Chalcidici, Greece, July 1998, Kluwer, Dordrecht, 1999.
-
(1999)
Proc. IFIP Database
-
-
Lubinski, A.1
-
275
-
-
77958593793
-
-
University of California, Irvine
-
Mehrotra, S. et al., Privacy Preserving Surveillance, Demonstration, University of California, Irvine, 2004, http://en.wikipedia.org/wiki/SensorML.
-
(2004)
Privacy Preserving Surveillance, Demonstration
-
-
Mehrotra, S.1
-
276
-
-
77958565948
-
-
Paliwal, A.V., N. Adam, C. Bornhövd, and J. Schaper, Semantic Discovery and Composition of Web Services for RFID Applications in Border Control, http://www.dvs1.informatik.tu-darmstadt.de/staff/bornhoevd/ISWC’04.pdf.
-
Semantic Discovery and Composition of Web Services for RFID Applications in Border Control
-
-
Paliwal, A.V.1
Adam, N.2
Bornhövd, C.3
Schaper, J.4
-
277
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A. et al., Security in wireless sensor networks, Commn. ACM, 2004.
-
(2004)
Commn. ACM
-
-
Perrig, A.1
-
281
-
-
85055954606
-
Security and privacy for sensor databases, sensor letters
-
Inaugural Issue, March
-
Thuraisingham, B., Security and privacy for sensor databases, sensor letters, Am. Sci., Inaugural Issue, March 2004.
-
(2004)
Am. Sci.
-
-
Thuraisingham, B.1
-
283
-
-
85055927784
-
-
SensorML http://en.wikipedia.org/wiki/SensorML.
-
-
-
|