Author:
Zhang Yingjun,Zhang Yang,Chen Kai
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Google Earth accused of aiding terrorists (December 2008), http://www.cnbeta.com/articles/71154.htm
2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29, 38–47 (1996)
3. Chun, S.A., Atluri, V.: Protecting privacy from continuous high-resolution satellite surveillance. In: Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions (2000)
4. Atluri, V., Chun, S.A.: An authorization model for geospatial data. IEEE Transactions on Dependable and Secure Computing 1, 238–254 (2004)
5. Atluri, V., Mazzoleni, P.: A uniform indexing scheme for geo-spatial data and authorizations. In: Proceedings of the 16th IFIP WG 11.3 Conference on Data and Application Security, pp. 207–218 (2002)