Databases Reference
In-Depth Information
36. Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for com-
posing access control policies. ACM Transactions on Information and System
Security 5 (1) (February 2002) 1-35
37. Abadi, M., Lamport, L.: Composing specifications. ACM Transactions on Pro-
gramming Languages 14 (4) (October 1992) 1-60
38. Hosmer, H.: Metapolicies II. In: Proc. of the 15th National Computer Security
Conference, Baltimore, MD (October 1992)
39. Jaeger, T.: Access control in configurable systems. Lecture Notes in Computer
Science 1603 (2001) 289-316
40. McLean, J.: The algebra of security. In: Proc. of the 1988 IEEE Computer
Society Symposium on Security and Privacy, Oakland, CA, USA (April 1988)
41. Bell, D.: Modeling the multipolicy machine. In: Proc. of the New Security
Paradigm Workshop, Little Compton, Rhode Island, USA (August 1994)
42. Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for re-
lational data management systems. ACM Transactions on Information Systems
17 (2) (April 1999) 101-140
43. Jajodia, S., Samarati, P., Sapino, M., Subrahmanian, V.: Flexible support for
multiple access control policies. ACM Transactions on Database Systems 26 (2)
(June 2001) 214-260
44. Jajodia, S., Samarati, P., Subrahmanian, V., Bertino, E.: A unified framework
for enforcing multiple access control policies. In: Proc. of the 1997 ACM In-
ternational SIGMOD Conference on Management of Data, Tucson, AZ (May
1997)
45. Li, N., Feigenbaum, J., Grosof, B.: A logic-based knowledge representation for
authorization with delegation. In: Proc. of the 12th IEEE Computer Security
Foundations Workshop, Washington, DC, USA (July 1999)
46. Woo, T., Lam, S.: Authorizations in distributed systems: A new approach.
Journal of Computer Security 2 (2,3) (1993) 107-136
47. Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control.
ACM Transactions on Information and System Security 6 (2) (May 2003) 286-
325
48. Damiani, E., De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi,
S., Samarati, P.: An experimental evaluation of multi-key strategies for data
outsourcing. In: Proc. of the 22nd IFIP TC-11 International Information Secu-
rity Conference (SEC 2007), Sandton, South Africa (May 2007)
49. Zych, A., Petkovic, M.: Key management method for cryptographically enforced
access control. In: Proc. of the 1st Benelux Workshop on Information and System
Security, Antwerpen, Belgium (2006)
50. Miklau, G., Suciu, D.: Controlling access to published data using cryptography.
In: Proc. of the 29th VLDB Conference, Berlin, Germany (September 2003)
51. Crampton, J., Martin, K., Wild, P.: On key assignment for hierarchical access
control. In: In Proc. of the 19th IEEE Computer Security Foundations Workshop
(CSFW'06), Los Alamitos, CA, USA (2006)
52. Sandhu, R.: On some cryptographic solutions for access control in a tree hi-
erarchy. In: Proc. of the 1987 Fall Joint Computer Conference on Exploring
Technology: Today and Tomorrow, Dallas, Texas, USA (1987)
53. Gudes, E.: The design of a cryptography based secure file system. IEEE Trans-
actions on Software Engineering 6 (1980) 411-420
54. Sandhu, R.: Cryptographic implementation of a tree hierarchy for access control.
Information Processing Letters 27 (1988) 95-98
Search WWH ::




Custom Search