Applications of spatial data structures: Computer graphics, image processing, and GIS
Applications of spatial data structures: Computer graphics, image processing, and GIS
Role-Based Access Control Models
Computer
Hierarchical reasoning about direction relations
GIS '96 Proceedings of the 4th ACM international workshop on Advances in geographic information systems
The ARBAC97 model for role-based administration of roles
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
Securing context-aware applications using environment roles
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
On the specification and evolution of access control policies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Spatial databases with application to GIS
Spatial databases with application to GIS
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Introductory Digital Image Processing: A Remote Sensing Perspective
Introductory Digital Image Processing: A Remote Sensing Perspective
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
IEEE Transactions on Knowledge and Data Engineering
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Authentic data publication over the internet
Journal of Computer Security - IFIP 2000
A reference framework for integrating multiple representations of geographical maps
GIS '03 Proceedings of the 11th ACM international symposium on Advances in geographic information systems
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
An Access Control System for a Web Map Management Service
RIDE '04 Proceedings of the 14th International Workshop on Research Issues on Data Engineering: Web Services for E-Commerce and E-Government Applications (RIDE'04)
Geography Mark-Up Language: Foundation for the Geo-Web
Geography Mark-Up Language: Foundation for the Geo-Web
An authorization model for geographical maps
Proceedings of the 12th annual ACM international workshop on Geographic information systems
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Flexible authentication of XML documents
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Proceedings of the tenth ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Proceedings of the eleventh ACM symposium on Access control models and technologies
Reasoning with semantics-aware access control policies for geospatial web services
Proceedings of the 3rd ACM workshop on Secure web services
Computer Processing of Remotely-Sensed Images: An Introduction
Computer Processing of Remotely-Sensed Images: An Introduction
GEO-RBAC: A spatially aware RBAC
ACM Transactions on Information and System Security (TISSEC)
Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Spatial Outsourcing for Location-based Services
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Detection and resolution of anomalies in firewall policy rules
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Bayesian network trust model in peer-to-peer networks
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
A data and query model for streaming geospatial image data
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Spatio-temporal access control: challenges and applications
Proceedings of the 14th ACM symposium on Access control models and technologies
Privacy-preserving data-oblivious geometric algorithms for geographic data
Proceedings of the 18th SIGSPATIAL International Conference on Advances in Geographic Information Systems
Hi-index | 0.00 |
Geospatial data play a key role in a wide spectrum of critical data management applications, such as disaster and emergency management, environmental monitoring, land and city planning, and military operations, often requiring the coordination among diverse organizations, their data repositories, and users with different responsibilities. Although a variety of models and techniques are available to manage, access and share geospatial data, very little attention has been paid to addressing security concerns, such as access control, security and privacy policies, and the development of secure and in particular interoperable GIS applications. The objective of this paper is to discuss the technical challenges raised by the unique requirements of secure geospatial data management and to suggest a comprehensive framework for security and privacy for geospatial data and GIS. Such a framework is the first coherent architectural approach to the problem of security and privacy for geospatial data.