共 16 条
- [1] Franklin M., Halevy A., Maier D., From databases to dataspaces: A new abstraction for information management, ACM SIGMOD Record, 34, 4, pp. 27-33, (2005)
- [2] Halevy A., Franklin M., Maier D., Principles of dataspace systems, Proceedings of 25th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 1-9, (2006)
- [3] Jin L., Zhang Y., Ye X., An extensible data model with security support for dataspace management, Proceedings of 10th IEEE International Conference on High Performance Computing and Communications, pp. 556-563, (2008)
- [4] Dittrich J.P., Salles M.A., iDM a unified and versatile data model for personal dataspace management, Proceedings of the 32nd International Conference on Very Large Data Bases, pp. 367-378, (2006)
- [5] Lee D., Lee W.C., Liu P., Supporting XML security models using relational databases: A vision, Proceedings of Xsym (XML Database Symposium), pp. 267-281, (2003)
- [6] Luo B., Lee D., Liu P., Pragmatic XML access control using off-the-shelf RDBMS, Proceedings of ESORICS (European Symposium On Research In Computer Security), pp. 55-71, (2007)
- [7] Koromilas L., Chinis G., Fundulaki I., Et al., Controlling access to XML documents over XML native and relational databases, Proceedings of Secure Data Management, pp. 122-141, (2009)
- [8] Lefevre K., Agrawal R., Ercegovac V., Et al., Limiting disclosure in hippocratic databases, Proceedings of the Thirtieth International Conference on Very Large Data Bases, pp. 108-119, (2004)
- [9] Chaudhuri S., Dutta T., Sudarshan S., Fine grained authorization through predicated grants, Proceedings of IEEE 23rd International Conference on Data Engineering, pp. 1174-1183, (2007)
- [10] Barker S., Dynamic meta-level access control in SQL, Proceedings of 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pp. 1-16, (2008)