IEEE Transactions on Software Engineering - Special issue on computer security and privacy
A framework for distributed authorization
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Database security
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Extensible markup language (XML) part 2: linking
World Wide Web Journal - Special issue on XML: principles, tools, and techniques
Cryptography and data security
Cryptography and data security
XML and Java: Developing Web Applications
XML and Java: Developing Web Applications
Authorization in CORBA Security
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
An Authorization Model and Its Formal Semantics
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Requirements for XML document database systems
DocEng '01 Proceedings of the 2001 ACM Symposium on Document engineering
An authorization model for temporal XML documents
Proceedings of the 2002 ACM symposium on Applied computing
Controlling Access to XML Documents
IEEE Internet Computing
E-P3P privacy policies and privacy authorization
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
A Specification Language for Distributed Policy Control
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002
An Access Control Model for Tree Data Structures
ISC '02 Proceedings of the 5th International Conference on Information Security
Translating Access Authorizations for Transformed XML Documents
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Secure Content Distribution for Digital Libraries
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
A propositional policy algebra for access control
ACM Transactions on Information and System Security (TISSEC)
Designing a distributed access control processor for network services on the Web
Proceedings of the 2002 ACM workshop on XML security
Regulating access to SMIL formatted pay-per-view movies
Proceedings of the 2002 ACM workshop on XML security
Towards securing XML Web services
Proceedings of the 2002 ACM workshop on XML security
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
A Privacy Policy Model for Enterprises
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Security for XML messaging services: a component-based approach
Journal of Network and Computer Applications
Provisions and Obligations in Policy Rule Management
Journal of Network and Systems Management
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Self-manifestation of composite multimedia objects to satisfy security constraints
Proceedings of the 2003 ACM symposium on Applied computing
Derived access control specification for XML
Proceedings of the 2003 ACM workshop on XML security
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
RDF metadata for XML access control
Proceedings of the 2003 ACM workshop on XML security
Access control of XML documents considering update operations
Proceedings of the 2003 ACM workshop on XML security
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Authorization Translation for XML Document Transformation
World Wide Web
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Using Web Service Technologies to Create an Information Broker: An Experience Report
Proceedings of the 26th International Conference on Software Engineering
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Static analysis of role-based access control in J2EE applications
ACM SIGSOFT Software Engineering Notes
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Tracking privacy compliance in B2B networks
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Relevancy based access control of versioned XML documents
Proceedings of the tenth ACM symposium on Access control models and technologies
Security analysis of cryptographically controlled access to XML documents
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
Integration and Efficient Lookup of Compressed XML Accessibility Maps
IEEE Transactions on Knowledge and Data Engineering
An access control method based on the prefix labeling scheme for XML repositories
ADC '05 Proceedings of the 16th Australasian database conference - Volume 39
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
A function-based access control model for XML databases
Proceedings of the 14th ACM international conference on Information and knowledge management
Towards multilateral secure digital rights distribution infrastructures
Proceedings of the 5th ACM workshop on Digital rights management
An access control model for querying XML data
Proceedings of the 2005 workshop on Secure web services
An authorization model for XML databases
SWS '04 Proceedings of the 2004 workshop on Secure web service
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Ontology guided XML security engine
Journal of Intelligent Information Systems - Special issue: Database and applications security
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Role-Based access control consistency validation
Proceedings of the 2006 international symposium on Software testing and analysis
XML access control using static analysis
ACM Transactions on Information and System Security (TISSEC)
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
Relevancy-based access control and its evaluation on versioned XML documents
ACM Transactions on Information and System Security (TISSEC)
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Secure Information Sharing in a Virtual Multi-Agency Team Environment
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Optimizing the secure evaluation of twig queries
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Persistent access control: a formal model for drm
Proceedings of the 2007 ACM workshop on Digital Rights Management
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
On the design, implementation and application of an authorisation architecture for web services
International Journal of Information and Computer Security
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
Knowledge sharing in virtual enterprises via an ontology-based access control approach
Computers in Industry
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
A general approach to securely querying XML
Computer Standards & Interfaces
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Adaptive Solutions for Access Control within Pervasive Healthcare Systems
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Information disclosure by answers to XPath queries
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Access control system to XML databases: a framework
IMSA '07 Proceedings of the Eleventh IASTED International Conference on Internet and Multimedia Systems and Applications
Towards an Approach of Semantic Access Control for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
Access control for XML documents and data
Information Security Tech. Report
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
XML repository searcher-browser supporting fine-grained access control
International Journal of Computers and Applications
XML secure views using semantic access control
Proceedings of the 2010 EDBT/ICDT Workshops
Platform for enterprise privacy practices: privacy-enabled management of customer data
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
XML-BB: a model to handle relationships protection in XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Multi-layer audit of access rights
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Hasslefree: simplified access control management for XML documents
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
xDUCON: cross domain usage control through shared data spaces
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Using ASP for knowledge management with user authorization
Data & Knowledge Engineering
fQuery: SPARQL query rewriting to enforce data confidentiality
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
ACM Transactions on Information and System Security (TISSEC)
Enforcing security policies for distributed objects applications
Proceedings of the 11th international conference on Security Protocols
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Policy classes and query rewriting algorithm for XML security views
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Defining and measuring policy coverage in testing access control policies
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Using contextual security policies for threat response
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Access authorization policy for XML document security
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A static analysis using tree automata for XML access control
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
A formal access control model for XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Detecting privacy violations in sensitive XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Extracting global policies for efficient access control of XML documents
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Access policy sheet for access control in fine-grained XML
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
XML-Based declarative access control
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
A flexible authorization framework for e-commerce
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
XML access control with policy matching tree
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Detecting information leakage in updating XML documents of fine-grained access control
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Unauthorized inferences in semistructured databases
Information Sciences: an International Journal
Exploiting node mobility for coordinating data usage in crisis scenarios
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Protection of relationships in XML documents with the XML-BB model
ICISS'05 Proceedings of the First international conference on Information Systems Security
A semantic approach for access control in web services
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
Secure XML querying based on authorization graphs
Information Systems Frontiers
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Obligations and their interaction with programs
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations
International Journal of Mobile Computing and Multimedia Communications
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |