Databases Reference
In-Depth Information
or from multiple agencies taken together may be sensitive, while individually
they are not necessarily of sensitive nature.
References
1. Ashraful Alam, Ganesh Subbiah, Bhavani Thuraisingam, and Latifur Khan.
Reasoning with semantics-aware access control policies for geospatial web ser-
vices. In SWS '06: Proceedings of the 3rd ACM workshop on Secure web services ,
pages 69-76, New York, NY, USA, 2006. ACM Press.
2. Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani
di Vimercati, and Pierangela Samarati. Supporting location-based conditions
in access control policies. In ASIACCS '06: Proceedings of the 2006 ACM Sym-
posium on Information, computer and communications security , pages 212-222,
New York, NY, USA, 2006. ACM Press.
3. Vijayalakshmi Atluri and Soon Ae Chun. An Authorization Model for Geospa-
tial Data. IEEE Transactions on Dependable and Secure Computing , 1(4):238-
254, 2004.
4. Vijayalakshmi Atluri and Soon Ae Chun. A Geotemporal Role-based Autho-
rization System. International Journal of Information and Computer Security ,
1(1/2):143-168, 2007.
5. John C. Baker, Beth E. Lachman, David R. Frelinger, Kevin M. O'Connell,
Alexander C. Hou, Michael S. Tseng, David Orletsky, and Charles Yost. Map-
ping the Risks: Assessing the Homeland Security Implications of Publicly Avail-
able Geospatial Information. Technical report, RAND National Defense Re-
search Institute, RAND Corporation, 2004.
6. Tom Barclay, Jim Gray, and Don Slutz. Microsoft TerraServer: a spatial data
warehouse. In SIGMOD '00: Proceedings of the 2000 ACM SIGMOD interna-
tional conference on Management of data , pages 307-318, New York, NY, USA,
2000. ACM Press.
7. Elisa Bertino, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca.
GEO-RBAC: a spatially aware RBAC. In Proceeding of the 10th ACM Sympo-
sium on Access Control Models and Technologies (SACMAT 2005) , pages 29-37,
2005.
8. Soon Ae Chun and Vijayalakshmi Atluri. Protecting Privacy from Continuous
High-resolution Satellite Surveillance. In Data and Application Security, De-
velopment and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working
Conference on Database Security , pages 233-244, 2000.
9. Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, and Mustaque Ahamad.
A Context-Aware Security Architecture for Emerging Applications. In Procced-
ings of 18th Annual Computer Security Applications Conference (ACSAC'2002) ,
pages 249-260, 2002.
10. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mus-
taque Ahamad, and Gregory D. Abowd. Securing context-aware applications
using environment roles. In Proceedings of the 6th ACM Symposium on Access
Control Models and Technologies (SACMAT 2001) , pages 10-20, 2001.
11. Maria Luisa Damiani, Elisa Bertino, Barbara Catania, and Paolo Perlasca.
GEO-RBAC: A spatially aware RBAC. ACM Transactions of Information Sys-
tems Security , 10(1), 2007.
Search WWH ::




Custom Search