A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
An authorization model for temporal XML documents
Proceedings of the 2002 ACM symposium on Applied computing
An access control model for data archives
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Proceedings of the 2002 ACM workshop on XML security
Designing a distributed access control processor for network services on the Web
Proceedings of the 2002 ACM workshop on XML security
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Self-manifestation of composite multimedia objects to satisfy security constraints
Proceedings of the 2003 ACM symposium on Applied computing
Design and implementation of a fine-grained menu control processor for web-based information systems
Future Generation Computer Systems - Selected papers on theoretical and computational aspects of structural dynamical systems in linear algebra and control
Derived access control specification for XML
Proceedings of the 2003 ACM workshop on XML security
RDF metadata for XML access control
Proceedings of the 2003 ACM workshop on XML security
Access control of XML documents considering update operations
Proceedings of the 2003 ACM workshop on XML security
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
A function-based access control model for XML databases
Proceedings of the 14th ACM international conference on Information and knowledge management
Meta-data indexing for XPath location steps
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Incremental adaptation of XPath access control views
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Compressed accessibility map: efficient access control for XML
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Optimizing the secure evaluation of twig queries
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Precomputing queries for personal health sensor environments
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
Access control system to XML databases: a framework
IMSA '07 Proceedings of the Eleventh IASTED International Conference on Internet and Multimedia Systems and Applications
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Security-conscious XML indexing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Optimizing XML data with view fragments
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Study on role-based access control model for web services and its application
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
An efficient access control model for schema-based relational storage of XML documents
Proceedings of the 49th Annual Southeast Regional Conference
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Access authorization policy for XML document security
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Access policy sheet for access control in fine-grained XML
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Using schemas to simplify access control for XML documents
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
XML access control with policy matching tree
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Two phase filtering for XML access control
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Enforce mandatory access control policy on XML documents
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Storing XML rules in relational storage of XML DTD
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.00 |