Providing Security and Interoperation of HeterogeneousSystems
Distributed and Parallel Databases - Security of data and transaction processing
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
CHAOS: An Active Security Mediation System
CAiSE '00 Proceedings of the 12th International Conference on Advanced Information Systems Engineering
Subject switching algorithms for access control in federated databases
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Administering permissions for distributed data: factoring and automated inference
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Secure mediation: requirements, design, and architecture
Journal of Computer Security - IFIP 2000
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
Privacy-preserving semantic interoperation and access control of heterogeneous databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Semantic access control for information interoperation
Proceedings of the eleventh ACM symposium on Access control models and technologies
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
An access control mechanism for P2P collaborations
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Rewrite specifications of access control policies in distributed environments
STM'10 Proceedings of the 6th international conference on Security and trust management
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
Hi-index | 0.00 |