Sciweavers

73 search results - page 3 / 15
» dbsec 2007
Sort
View
DBSEC
2000
111views Database» more  DBSEC 2000»
13 years 6 months ago
Authentic Third-party Data Publication
Premkumar T. Devanbu, Michael Gertz, Charles U. Ma...
DBSEC
2000
89views Database» more  DBSEC 2000»
13 years 6 months ago
WorkFlow Analyzed for Security and Privacy in using Databases
Wouter Teepe, Reind P. van de Riet, Martin S. Oliv...
DBSEC
2007
121views Database» more  DBSEC 2007»
13 years 6 months ago
XACML Policies for Exclusive Resource Usage
The extensible access control markup language (XACML) is the standard access control policy specification language of the World Wide Web. XACML does not provide exclusive accesse...
Vijayant Dhankhar, Saket Kaushik, Duminda Wijeseke...
DBSEC
2006
107views Database» more  DBSEC 2006»
13 years 6 months ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
DBSEC
2000
117views Database» more  DBSEC 2000»
13 years 6 months ago
Database Security 2000
Database systems are being more and more used, with larger sized databases, and as components of very complex systems, that include numerous protocols. Database security problems ...
John R. Campbell