A geotemporal role-based authorisation system
暂无分享,去创建一个
[1] Silvana Castano,et al. Database Security , 1997, IFIP Advances in Information and Communication Technology.
[2] Alfons H. Salden,et al. Context sensitive access control , 2005, SACMAT '05.
[3] James Ze Wang,et al. Classifying Objectionable Websites Based on Image Content , 1998, IDMS.
[4] Jim Gray,et al. Microsoft TerraServer: a spatial data warehouse , 1999, SIGMOD '00.
[5] Vijayalakshmi Atluri,et al. An authorization model for temporal and derived data: securing information portals , 2002, TSEC.
[6] Arnon Rosenthal,et al. Security Administration for Federations, Warehouses, and other Derived Data , 1999, DBSec.
[7] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[8] Oscar Firschein,et al. System for Classifying Objectionable Websites , 1998 .
[9] Jun Zhang,et al. A Novel Watermarking for Image Security , 2004, ISCIS.
[10] Manish Parashar,et al. Dynamic context-aware access control for grid applications , 2003, Proceedings. First Latin American Web Congress.
[11] Cheng-Zhong Xu,et al. A coordinated spatio-temporal access control model for mobile computing in coalition environments , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[12] Elisa Bertino,et al. A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..
[13] Vijayalakshmi Atluri,et al. Protecting Privacy from Continuous High-resolution Satellite Surveillance , 2000, DBSec.
[14] Jim Gray,et al. TerraService.NET: An Introduction to Web Services , 2002, ArXiv.
[15] Vijayalakshmi Atluri,et al. An authorization model for geospatial data , 2004, IEEE Transactions on Dependable and Secure Computing.
[16] A. Murat Tekalp,et al. A hierarchical image authentication watermark with improved localization and security , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[17] Vijayalakshmi Atluri,et al. An Authorization Model for Workflows , 1996, ESORICS.
[18] Michiharu Kudo,et al. XML document security based on provisional authorization , 2000, CCS.
[19] Pierangela Samarati,et al. An Access Control System for SVG Documents , 2002 .
[20] Elisa Bertino,et al. An access control system for a Web map management service , 2004, 14th International Workshop Research Issues on Data Engineering: Web Services for e-Commerce and e-Government Applications, 2004. Proceedings..
[21] Elisa Bertino,et al. Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.
[22] Elisa Bertino,et al. An Authorization Model for a Distributed Hypertext System , 1996, IEEE Trans. Knowl. Data Eng..
[23] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[24] Elisa Bertino,et al. An access control model for video database systems , 2000, CIKM '00.
[25] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.