Privacy query rewriting algorithm instrumented by a privacy-aware access control model
暂无分享,去创建一个
F. Cuppens | N. Cuppens-Boulahia | D. Benslimane | M. Barhamgi | Said Oulmakhzoune | Stephane Morucci
[1] Nora Cuppens-Boulahia,et al. Privacy Policy Preferences Enforced by SPARQL Query Rewriting , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[2] Nora Cuppens-Boulahia,et al. Rewriting of SPARQL/Update Queries for Securing Data Access , 2010, ICICS.
[3] Nektarios Gioldasis,et al. SPARQL2XQuery 2.0: Supporting Semantic-based queries over XML data , 2010, 2010 Fifth International Workshop Semantic Media Adaptation and Personalization.
[4] Brahim Medjahed,et al. A Query Rewriting Approach for Web Service Composition , 2010, IEEE Transactions on Services Computing.
[5] Nora Cuppens-Boulahia,et al. fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality , 2010, DBSec.
[6] Nora Cuppens-Boulahia,et al. Contextual Privacy Management in Extended Role Based Access Control Model , 2009, DPM/SETOP.
[7] Nektarios Gioldasis,et al. Semantic Based Access over XML Data , 2009, WSKS.
[8] Amirreza Masoumzadeh,et al. PuRBAC: Purpose-Aware Role-Based Access Control , 2008, OTM Conferences.
[9] Ernesto Damiani,et al. A general approach to securely querying XML , 2008, Comput. Stand. Interfaces.
[10] Nora Cuppens-Boulahia,et al. Modeling contextual security policies , 2008, International Journal of Information Security.
[11] Jorge Lobo,et al. On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.
[12] Ning Zhang,et al. A Purpose-Based Access Control Model , 2007, Third International Symposium on Information Assurance and Security.
[13] Nora Cuppens-Boulahia,et al. High Level Conflict Management Strategies in Advanced Access Control Models , 2007, ICS@SYNASC.
[14] Jorge Lobo,et al. Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.
[15] Seog Park,et al. An Efficient Yet Secure XML Access Control Enforcement by Safe and Correct Query Modification , 2006, DEXA.
[16] Sabrina De Capitani di Vimercati,et al. An access control model for querying XML data , 2005, SWS '05.
[17] Yuqing Wu,et al. Access control for XML: a dynamic query rewriting approach , 2005, CIKM '05.
[18] Peng Liu,et al. QFilter: fine-grained run-time XML access control via NFA-based query rewriting , 2004, CIKM '04.
[19] R. Ramakrishnan,et al. Limiting disclosure in hippocratic databases , 2004, VLDB 2004.
[20] Wenfei Fan,et al. Secure XML querying with security views , 2004, SIGMOD '04.
[21] M. Kudo,et al. XML access control using static analysis , 2003, CCS '03.
[22] Dan Suciu,et al. Controlling Access to Published Data Using Cryptography , 2003, VLDB.
[23] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[24] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[25] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[26] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[27] Herbert Burkert,et al. Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. , 1996 .
[28] Charles A. Shoniregun,et al. Securing XML Documents , 2004, Australas. J. Inf. Syst..