Belief reasoning in MLS deductive databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Providing Security and Interoperation of HeterogeneousSystems
Distributed and Parallel Databases - Security of data and transaction processing
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Exchanging intensional XML data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Secure mediation: requirements, design, and architecture
Journal of Computer Security - IFIP 2000
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Exchanging intensional XML data
ACM Transactions on Database Systems (TODS) - Special Issue: SIGMOD/PODS 2003
Compressed accessibility map: efficient access control for XML
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A Secure Mediator for Integrating Multiple Level Access Control Policies
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Privacy-preserving schema matching using mutual information
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Privacy-preserving query checking in query middleware
FSKD'09 Proceedings of the 6th international conference on Fuzzy systems and knowledge discovery - Volume 1
Peer-to-peer data integration with active XML
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Hi-index | 0.00 |
With the evolution of the information superhighway, there is now an immense amount of information available in a wide variety of databases. Furthermore, users often have the ability to access legacy software packages developed by external sources. However, sometimes both the information provided by a data source, as well as one or more of the functions available through a software package may be sensitive-in such cases, organizations require that access by users be controlled. HERMES (HEterogeneous Reasoning and MEdiator System) is a platform that has been developed at the University of Maryland within which mediators may be designed and implemented. HERMES has already been used for a number of applications. In this paper, we provide a formal model of security in mediated systems. We then develop techniques that are sound and complete and respect security constraints of packages/databases participating in the mediated system. The security constraints described an this paper have been implemented, and we describe the existing implementation.