Observation-based Fine Grained Access Control of Data
暂无分享,去创建一个
[1] S. Sudarshan,et al. Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.
[2] Matthias Kirschner,et al. Detecting Suspicious Relational Database Queries , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[3] Brajendra Panda,et al. Monitoring Information Leakage During Query Aggregation , 2007, ICDCIT.
[4] Agostino Cortesi,et al. Widening and narrowing operators for abstract interpretation , 2011, Comput. Lang. Syst. Struct..
[5] Agostino Cortesi,et al. Observation-Based Fine Grained Access Control for XML Documents , 2011, CISIM.
[6] Agostino Cortesi,et al. Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010, J. Univers. Comput. Sci..
[7] Hong Zhu,et al. Fine-Grained Access Control for Database Management Systems , 2007, BNCOD.
[8] Rakesh Agrawal,et al. Extending relational database systems to automatically enforce privacy policies , 2005, 21st International Conference on Data Engineering (ICDE'05).
[9] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[10] Agostino Cortesi,et al. Abstract interpretation of database query languages , 2012, Comput. Lang. Syst. Struct..
[11] Peng Liu,et al. QFilter: fine-grained run-time XML access control via NFA-based query rewriting , 2004, CIKM '04.
[12] Makoto Murata,et al. XML access control using static analysis , 2006, TSEC.
[13] Agostino Cortesi,et al. Fine Grained Access Control for Relational Databases by Abstract Interpretation , 2010, ICSOFT.
[14] Ernesto Damiani,et al. Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.
[15] Hong Zhu,et al. Controlling Information Leakage of Fine-Grained Access Model in DBMSs , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[16] Neha Sehta,et al. A Fine Grained Access Control Model for Relational Databases , 2012 .
[17] Yi Mu,et al. Delegatable Access Control for Fine-Grained XML , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[18] David J. DeWitt,et al. Limiting Disclosure in Hippocratic Databases , 2004, VLDB.
[19] Elisa Bertino,et al. Secure and selective dissemination of XML documents , 2002, TSEC.
[20] Agostino Cortesi,et al. Abstract Interpretation of Recursive Queries , 2013, ICDCIT.
[21] Tsan-sheng Hsu,et al. Quantifying Privacy Leakage through Answering Database Queries , 2002, ISC.
[22] Laks V. S. Lakshmanan,et al. Compressed Accessibility Map: Efficient Access Control for XML , 2002, VLDB.
[23] Tao Jiang,et al. On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.
[24] Peng Liu,et al. Supporting XML Security Models Using Relational Databases: A Vision , 2003, Xsym.
[25] Jorge Lobo,et al. On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.
[26] Sotiris Ioannidis,et al. Controlling Access to XML Documents over XML Native and Relational Databases , 2009, Secure Data Management.
[27] Lu Chang. Client-Based Access Control Management for XML Documents , 2006 .
[28] Mong-Li Lee,et al. Access Control of XML Documents in Relational Database Systems , 2001, International Conference on Internet Computing.
[29] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[30] S. Sudarshan,et al. Redundancy and information leakage in fine-grained access control , 2006, SIGMOD Conference.
[31] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[32] Agostino Cortesi,et al. Abstract program slicing of database query languages , 2013, SAC '13.