1 |
Yue Wang, Kian-Lee Tan, 'A Scalable XML Access Control System,' In Proceedings of the 10th International WWW Conference(Poster), 2001
|
2 |
Albrecht Schmidt, Florian Waas, Martin Kersten, Michael J.Carey, Ioana Manolescu and Ralph Busse, 'Xmark: A Benchmark for XML Data Management,' Proc. VLDB, Hong Kong, China, 2002
|
3 |
Kevin Williams (Editor), et al., 'Professional XML Databases,' wrox, 2001
|
4 |
P.Samarati, E.Bertino, and S.Jajodia, 'An Authorization Model for a Distritbuted Hypertext System,' IEEE TKDE, 8(4):555-562, August 1996
|
5 |
S.Jajodia, P.samarati, and V.S. Subrahmanian, 'A Logical Language for Expressing Authorization,' In Proceeding of the IEEE Symposium on Security and Privacy, pages 31-42, Oakland, CA, May 1997
DOI
|
6 |
Igor Tatarinov, Zachary G. Ives, Alon Y.Halevy, Daniel S.Weld, 'Updating XML,' ACM SIGMOD, pp 413-424, Santa Barbara, California, USA, May, 2001
|
7 |
E.Damiani, S.Vimercati, S.Paraboschi, and P.Samarati, 'Securing xml document,' In Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000), pp. 121-135, Konstan, Germany, March, 2000
|
8 |
E.Damiani, S.Vimercati, S.Paraboachk and P.Samarati, 'Design and implementation of an access processor for xml documents,' In Proceedings of the 9th international WWW conference, Amsterdam, May 2000
DOI
ScienceOn
|
9 |
T.F. Lunt, 'Access Control Policies for Database Systems,' In C.E. Landwehr, editor, Database Security, II:status and Prospects, North-Holland, Amsterdam, 1989
|
10 |
S.Castano, M.Fugini, G.Martella and P.Samarati, 'Database Security,' Addision-Wesley, 1995
|
11 |
T.Bray et.al. (ed.), 'Extensible Markup Language (XML) 1.0,' World Wide Web Consortium (W3C), February 1998. http://www.w3.org/TR/REC-xml
|
12 |
S.Boag, D.Chamberlin, M.F. Fernandez, D.Florescu, J.Robie, J.simeon, and M.Stefanescu, 'XQuery 1.0: An XML query language,' http://www.w3.org/TR/xquery/, 30 April 2002. W3C working draft
|
13 |
David Hunter (Editor), et al., 'Beginning XML,' wrox, 2001
|
14 |
Rutgers Security Team, 'WWW Security, A survey,' 1999. http://www-ns.rutgers.edu/www-security/
|
15 |
Oracle, 'Database Security in Oracle 8i,' February 1999
|