Sciweavers

123 search results - page 19 / 25
» Confidentiality Policies and Their Enforcement for Controlle...
Sort
View
EGOV
2010
Springer
13 years 8 months ago
From Policy-Making Statements to First-Order Logic
Within a framework for enriched on-line discussion forums for e-government policy-making, pro and con statements for positions are input, structurally related, then logically repre...
Adam Wyner, Tom M. van Engers, Kiavash Bahreini
VLDB
1993
ACM
73views Database» more  VLDB 1993»
13 years 11 months ago
A Model of Methods Access Authorization in Object-oriented Databases
Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, perfo...
Nurit Gal-Oz, Ehud Gudes, Eduardo B. Fernán...
SIGMOD
2004
ACM
198views Database» more  SIGMOD 2004»
14 years 7 months ago
Secure XML Querying with Security Views
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing ...
Wenfei Fan, Chee Yong Chan, Minos N. Garofalakis
VLDB
2007
ACM
116views Database» more  VLDB 2007»
14 years 7 months ago
On the Correctness Criteria of Fine-Grained Access Control in Relational Databases
Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to incr...
Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa...
USS
2004
13 years 9 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...