Sciweavers

169 search results - page 24 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
PODS
2010
ACM
242views Database» more  PODS 2010»
14 years 20 days ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak
SACMAT
2010
ACM
13 years 12 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...
IFIP
2004
Springer
14 years 29 days ago
A Formal Approach to Specify and Deploy a Network Security Policy
Current firewall configuration languages have no well founded semantics. Each firewall implements its own algorithm that parses specific proprietary languages. The main conseq...
Frédéric Cuppens, Nora Cuppens-Boula...
SACMAT
2003
ACM
14 years 26 days ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
VLDB
2004
ACM
147views Database» more  VLDB 2004»
14 years 28 days ago
Client-Based Access Control Management for XML documents
The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for prot...
Luc Bouganim, François Dang Ngoc, Philippe ...