1 |
Elisa, B., et al., "An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning," ACM Transactions on Database Systems, 23(3), 2012
|
2 |
Evered, M., "A Two-Level Architecture for Semantic Protection of Persistent Distributed Objects," Proc, Intl. Conf. on Software Methods and Tools, Heidelberg 2012.
|
3 |
Hale, J., J. Threet, S. Shenoi, "A framework for high assurance security of distributed objects," in Database Security, Chapman and Hall, London, pp.99-115, 2011.
|
4 |
Hale, J., J. Threet, and S. Shenoi, Capability-based primitives for access control in object-oriented systems, in Database Security, Chapman and Hall, London, pp. 134-150, 2010.
|
5 |
Joon P., and S. Ravi, "RBAC on the web by smart certificates." In Proceedings of 4th ACM Workshop on Role-Based Access Control. ACM, Fairfax, VA, October pp. 28-29 2011
|
6 |
Joshi, J.B.D. et al., "Security Models for Web-based Applications," Communications of the ACM, 2. pp. 44-52, 2011.
|
7 |
Karjoth, G., "Authorization in CORBA Security," In Proceedings of Fifth European Symposium on Research in Computer Security, pp. 143-158, 2010.
|
8 |
Pernul, G., A. M. Tjoa and W. Winiwarter, Modelling Data Secrecy And Integrity, Data & Knowledge Engineering, Vol. 26, pp. 291-308, 2011.
|
9 |
Reddy M., ORBs & ODBMS : "Two complementary ways to distribute objects," Object Magazine, pp. 24-30, June, 2010.
|
10 |
Blakley, B., R. Blakley and R.M. Soley, CORBA Security: An Introduction to Safe Computing with Objects, Addison-Wesley, 2010.
|
11 |
Byrne R, M. Roantree, "An Object Architecture for ODMG Database," Proceeding of the 34th International HICSS Conference, IEEE Computer Press 2010.
|
12 |
Cuppens, F. and A. Gabillon "A logical approach to model a multilevel object oriented database," in Database Security, Chapman and Hall, London, pp.145-166, 2010.
|