An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Securing XML Documents with Author-X
IEEE Internet Computing
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A Role-Based Access Control Model for XML Repositories
WISE '00 Proceedings of the First International Conference on Web Information Systems Engineering (WISE'00)-Volume 1 - Volume 1
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
A formal language for specifying complex XML authorisations with temporal constraints
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Hi-index | 0.00 |
Protecting data over the web is today a crucial need for many companies and organizations. This requires not only the use of cryptographic and digital signature techniques for protecting data during transmission, but also the development of suitable access control models and mechanisms able to support the specification and enforcement of a variety of access control policies. In this paper, we first discuss which are the main access control requirements for web data, and compare some of the most important research proposals with respect to these requirements. We then present Author-X [6] as an example of comprehensive system for controlling access to web data.