Developing a Dynamic Trust-Based Access Control Model for XML Databases.
暂无分享,去创建一个
[1] Elisa Bertino,et al. Privacy Protection , 2022 .
[2] Erik T. Ray,et al. Learning XML , 2001 .
[3] E. Damiani,et al. New paradigms for access control in open environments , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..
[4] Sarbjeet Singh. Trust Based Authorization Framework for Grid Services , 2011 .
[5] Seog Park,et al. New Access Control for Secure Query Processing over XML Data Stream , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[6] W. Glas. Xml and Databases , 2002 .
[7] Ernesto Damiani,et al. XML Security , 2007, Security, Privacy, and Trust in Modern Data Management.
[8] Paolo Atzeni,et al. XML AND DATABASES , 2004 .
[9] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[10] Yuqing Wu,et al. Access control for XML: a dynamic query rewriting approach , 2005, CIKM '05.
[11] Ruonan Rao,et al. Trust Based Access Control Framework for R-OSGi , 2010, 2010 2nd International Workshop on Database Technology and Applications.
[12] J. Wenny Rahayu,et al. Privacy-aware access control in XML databases , 2010, ADC.
[13] Sabrina De Capitani di Vimercati,et al. Access Control Models for XML , 2008, Handbook of Database Security.
[14] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[15] Junshan Li,et al. A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.
[16] Zahid Anwar,et al. TRDBAC: Temporal reflective database access control , 2010, 2010 6th International Conference on Emerging Technologies (ICET).
[17] Joon S. Park,et al. Role-based profile analysis for scalable and accurate insider-anomaly detection , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[18] Yonggwan Won,et al. A Flexible Database Security System Using Multiple Access Control Policies , 2003, DEXA.
[19] Yanchun Zhang,et al. An Integrated Access Control for Securely Querying and Updating XML Data , 2008, ADC.
[20] Aye Sandar Myint. High performance and scalable client-based access control model for XML databases , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[21] Ernesto Damiani,et al. A general approach to securely querying XML , 2008, Comput. Stand. Interfaces.
[22] Haicheng Xu,et al. A dynamic Access Control model based on trust , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.
[23] Zhiyong Feng,et al. A Trust-Based Access Control with Feedback , 2008, 2008 International Symposiums on Information Processing.
[24] Joon S. Park,et al. A composite rbac approach for large, complex organizations , 2004, SACMAT '04.
[25] Barbara Catania,et al. XML Data Stores: Emerging Practices , 2005, IEEE Internet Comput..
[26] Stephen Hailes,et al. A Distributed Trust Model (extended abstract) , 1997 .
[27] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.
[28] Sriram Mohan,et al. A Framework for Access Control for XML , 2022 .
[29] Laks V. S. Lakshmanan,et al. Compressed Accessibility Map: Efficient Access Control for XML , 2002, VLDB.
[30] Ji Ma,et al. Risk Analysis in Access Control Systems Based on Trust Theories , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.
[31] Masatoshi Yoshikawa,et al. A Study on Efficient Access Control for XML Ducuments , 2005, ICDE Workshops.
[32] Li Zhou,et al. Adaptive trust negotiation and access control , 2005, SACMAT '05.
[33] Yong Chen,et al. Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..
[34] Alban Gabillon. An authorization model for XML databases , 2004, SWS '04.
[35] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[36] Yi Hu,et al. Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[37] Hua Wang,et al. A Purpose Based Access Control in XML Databases System , 2010, 2010 Fourth International Conference on Network and System Security.
[38] Yuqing Wu,et al. ACXESS - Access Control for XML with Enhanced Security Specifications , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[39] Fei Li,et al. A bitmap indexing scheme for temporal access control to XML documents , 2008, 2008 IEEE International Symposium on IT in Medicine and Education.
[40] Dongwon Lee,et al. Comparative analysis of six XML schema languages , 2000, SGMD.
[41] Michael Collins,et al. Evaluating Trust-Based Access Control for Social Interaction , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.
[42] Laks V. S. Lakshmanan,et al. A compressed accessibility map for XML , 2004, TODS.
[43] Vijay Varadharajan,et al. A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[44] Erik Vullings,et al. A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.
[45] Maggie Duong. Access control model and labelling scheme for efficient querying and updating XML data , 2010 .
[46] Vijay Varadharajan,et al. RBAC for XML Document Stores , 2001, ICICS.
[47] Seog Park,et al. Efficient access control labeling scheme for secure XML query processing , 2011, Comput. Stand. Interfaces.
[48] Sylvia L. Osborn,et al. A role-based approach to access control for XML databases , 2004, SACMAT '04.
[49] Sun-Moon Jo,et al. Access control model for secure XML documents , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[50] Andrés Marín López,et al. TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.
[51] Hong Zhu,et al. A flexible mandatory access control policy for XML databases , 2007 .
[52] José A. Pino,et al. Access control mechanism for collaborative video database production applications , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.
[53] Andrés Marín López,et al. Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[54] Seog Park,et al. A Schema Based Approach to Valid XML Access Control , 2010, J. Inf. Sci. Eng..
[55] Sabrina De Capitani di Vimercati,et al. An access control model for querying XML data , 2005, SWS '05.
[56] Yuqing Wu,et al. A Rewrite Based Approach for Enforcing Access Constraints for XML , 2007, KES.
[57] Jussi Myllymaki,et al. A function-based access control model for XML databases , 2005, CIKM '05.
[58] Alban Gabillon. A Formal Access Control Model for XML Databases , 2005, Secure Data Management.
[59] Blake Dournaee,et al. XML Security , 2002 .
[60] Dan Suciu,et al. Data on the Web: From Relations to Semistructured Data and XML , 1999 .
[61] Wang Yu,et al. An mixed access control method based on trust and role , 2012 .
[62] Sayyed Kamyar Izadi,et al. XPLC: A Novel Protocol for Concurrency Control in XML Databases , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.
[63] Ernesto Damiani,et al. Controlling Access to XML Documents , 2001, IEEE Internet Comput..