Using integrity constraints to provide intensional answers to relational queries
VLDB '89 Proceedings of the 15th international conference on Very large data bases
Query evaluation techniques for large databases
ACM Computing Surveys (CSUR)
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
The secondary and approximate authorization model and its application to Bell-LaPadula policies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Redundancy and information leakage in fine-grained access control
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Flooding and recycling authorizations
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
Flexible and efficient access control in oracle
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Authorization recycling in RBAC systems
Proceedings of the 13th ACM symposium on Access control models and technologies
Enabling policy-based access control in BI applications
Data & Knowledge Engineering
Access control over uncertain data
Proceedings of the VLDB Endowment
Assessing query privileges via safe and efficient permission composition
Proceedings of the 15th ACM conference on Computer and communications security
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Querying data sources that export infinite sets of views
Proceedings of the 12th International Conference on Database Theory
Fine-grained access control for database management systems
BNCOD'07 Proceedings of the 24th British national conference on Databases
Authorization recycling in hierarchical RBAC systems
ACM Transactions on Information and System Security (TISSEC)
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Authorization views and conditional query containment
ICDT'05 Proceedings of the 10th international conference on Database Theory
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
Hi-index | 0.00 |