High-speed Access Control for XML Documents (Englisch)
- Neue Suche nach: Yoon, J. P.
- Neue Suche nach: Yoon, J. P.
- Neue Suche nach: De Capitani di Vimercati, S.
- Neue Suche nach: Ray, I.
In:
Annual working conference on data and applications security; IFIP TC11/WG11.3
142
;
261-274
;
2004
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:High-speed Access Control for XML Documents
-
Beteiligte:
-
Kongress:17th, Annual working conference on data and applications security; IFIP TC11/WG11.3 ; 2003 ; Estes Park, CO
-
Erschienen in:
-
Verlag:
- Neue Suche nach: London
-
Erscheinungsort:Boston , Kluwer Academic, , c2004.
-
Erscheinungsdatum:01.01.2004
-
Format / Umfang:14 pages
-
Anmerkungen:Includes bibliographical references and index
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Remote Computer Fingerprinting for Cyber Crime InvestigationsNovotny, J. / Schulte, D. / Manes, G. / Shenoi, S. et al. | 2004
- 16
-
Improving Damage Assessment Efficacy in case of Frequent Attacks on DatabasesRagothaman, P. / Panda, B. et al. | 2004
- 33
-
Delivering Services with Integrity Guarantees in Survivable Database SystemsZhang, J. / Liu, P. et al. | 2004
- 47
-
Certifying Data from Multiple SourcesNuckolls, G. / Martel, C. / Stubblebine, S. G. et al. | 2004
- 61
-
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service ModelHacigumus, H. / Iyer, B. / Mehrotra, S. et al. | 2004
- 75
-
Adapting Query Optimization Techniques for Efficient Alert CorrelationNing, P. / Xu, D. et al. | 2004
- 91
-
Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned DatabasesGudes, E. / Rozenberg, B. et al. | 2004
- 105
-
Privacy under Conditions of Concurrent Interaction with Multiple PartiesOlivier, M. S. et al. | 2004
- 119
-
Correlated Data InferenceFarkas, C. / Stoica, A. G. et al. | 2004
- 133
-
Anti-Tamper Databases: Querying Encrypted DatabasesOzsoyoglu, G. / Singer, D. A. / Chung, S. S. et al. | 2004
- 149
-
Administration Rights in the SDSD-SystemBiskup, J. / Leineweber, T. / Parthe, J. et al. | 2004
- 163
-
Secure Authorisation for Web ServicesIndrakanti, S. / Varadharajan, V. / Hitchens, M. / Kumar, R. et al. | 2004
- 176
-
A Decentralized Approach for Controlled Sharing of Resources in Virtual CommunitiesBertino, E. / Ferrari, E. / Squicciarini, A. C. et al. | 2004
- 190
-
Supporting Delegation in Secure Workflow Management SystemsAtluri, V. / Bertino, E. / Ferrari, E. / Mazzoleni, P. et al. | 2004
- 205
-
Modifying LDAP to Support PKIChadwick, D. W. / Ball, E. / Sahalayev, M. V. et al. | 2004
- 215
-
ECPV: Efficient Certificate Path Validation in Public-key InfrastructureHalappanavar, M. / Mukkamala, R. et al. | 2004
- 229
-
Semantics-Aware Perimeter ProtectionCremonini, M. / Damiani, E. / Samarati, P. et al. | 2004
- 243
-
Systematic Development of a Family of Fair Exchange ProtocolsEzhilchelvan, P. D. / Shrivastava, S. K. et al. | 2004
- 261
-
High-speed Access Control for XML DocumentsYoon, J. P. et al. | 2004
- 275
-
Chinese Wall Security Policy Models: Information Flows and Confining Trojan HorsesLin, T. Y. et al. | 2004
- 288
-
RBAC Policy Implementation for SQL DatabasesBarker, S. / Douglas, P. et al. | 2004
- 302
-
An Administrative Model for Role GraphsWang, H. / Osborn, S. L. et al. | 2004
- 316
-
Safety and Liveness for an RBAC/MAC Security ModelPhillips, C. / Demurjian, S. / Ting, T. C. et al. | 2004
- 330
-
Schema Based XML Security: RBAC ApproachZhang, X. / Park, J. / Sandhu, R. et al. | 2004
- 344
-
Persistent versus Dynamic Role MembershipBacon, J. / Chadwick, D. W. / Otenko, O. / Moody, K. et al. | 2004
- 358
-
FlexFlow: A Flexible Flow Control Policy Specification FrameworkChen, S. / Wijesekera, D. / Jajodia, S. et al. | 2004
- 375
-
Data and Applications Security: Past, Present and the FutureThuraisingham, B. et al. | 2004
- 393
-
Digital Forensics: Operational, Legal, and Research IssuesPollitt, M. / Caloyannides, M. / Novotny, J. / Shenoi, S. et al. | 2004