A Formal Study of Collaborative Access Control in Distributed Datalog
暂无分享,去创建一个
[1] Martín Abadi,et al. A calculus for access control in distributed systems , 1991, TOPL.
[2] S. Sudarshan,et al. Fine Grained Authorization Through Predicated Grants , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[3] Patricia G. Selinger,et al. Access path selection in a relational database management system , 1979, SIGMOD '79.
[4] Val Tannen,et al. Provenance semirings , 2007, PODS.
[5] Patrick Valduriez,et al. Principles of Distributed Database Systems, Third Edition , 2011 .
[6] Prashant Malik,et al. Cassandra: a decentralized structured storage system , 2010, OPSR.
[7] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[8] BertinoElisa,et al. Database Security-Concepts, Approaches, and Challenges , 2005 .
[9] Bhavani M. Thuraisingham,et al. A semantic web based framework for social network access control , 2009, SACMAT '09.
[10] Daniel Deutch,et al. Provenance for aggregate queries , 2011, PODS.
[11] Serge Abiteboul,et al. Foundations of Databases , 1994 .
[12] Wolfgang Nejdl,et al. Evaluating Recursive Queries in Distributed Databases , 1993, IEEE Trans. Knowl. Data Eng..
[13] Dan Suciu,et al. Automatic Enforcement of Data Use Policies with DataLawyer , 2015, SIGMOD Conference.
[14] Ioana Manolescu,et al. Web Data Management , 2011 .
[15] Jaehong Park,et al. A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[16] Patrick Valduriez,et al. Principles of Distributed Database Systems , 1990 .
[17] Serge Abiteboul,et al. Collaborative Access Control in WebdamLog , 2015, SIGMOD Conference.
[18] Jorge Lobo,et al. On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.
[19] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[20] Serge Abiteboul,et al. A rule-based language for web data management , 2011, PODS.
[21] David J. DeWitt,et al. Limiting Disclosure in Hippocratic Databases , 2004, VLDB.
[22] Elena Ferrari,et al. Access Control in Data Management Systems , 2010, Access Control in Data Management Systems.
[23] Serge Abiteboul,et al. Rule-based application development using Webdamlog , 2013, SIGMOD '13.
[24] Guy Hulin,et al. Parallel Processing of Recursive Queries in Distributed Architectures , 1989, VLDB.
[25] Serge Abiteboul,et al. Complexity of answering queries using materialized views , 1998, PODS.
[26] Balder ten Cate,et al. Queries with Guarded Negation , 2012, Proc. VLDB Endow..
[27] Hong Zhu,et al. Controlling Information Leakage of Fine-Grained Access Model in DBMSs , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[28] Anand Rajaraman,et al. Answering queries using templates with binding patterns (extended abstract) , 1995, PODS.
[29] Surajit Chaudhuri,et al. On the Equivalence of Recursive and Nonrecursive Datalog Programs , 1997, J. Comput. Syst. Sci..
[30] Anthony J. Bonner,et al. Transaction datalog: A compositional language for transaction programming , 1997 .
[31] Michael Stonebraker,et al. The design and implementation of INGRES , 1976, TODS.
[32] Serge Abiteboul,et al. Web information management with access control , 2011, WebDB.
[33] Carl A. Gunter,et al. A formal framework for reflective database access control policies , 2008, CCS.
[34] Elisa Bertino,et al. Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.