Author:
Farkas Csilla,Brodsky Alexander,Jajodia Sushil
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference77 articles.
1. S. Abiteboul, Querying semi-structured data, in: ICDT, 1997, pp. 1–18.
2. R. Agrawal, R. Srikant, Privacy-preserving data mining, in: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, 2000, pp. 439–450.
3. Clearing the way for physicians’ use of clinical information systems;Anderson;Commun. ACM,1997
4. D.E. Bell, L.J. LaPadula, Secure computer systems: Mathematical foundation and model, Technical Report, Mitre Corp. Report No. M74-244, Bedford, Mass., 1975.
5. S. Benferhat, F. Autrel, F. Cuppens, A possibilistic logic encoding of access control, in: FLAIRS Conf., 2003, pp. 481–485.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On the use of fuzzy partitions to protect data;Integrated Computer-Aided Engineering;2014-05-29
2. On Inference-Proof View Processing of XML Documents;IEEE Transactions on Dependable and Secure Computing;2013-03
3. Secrecy-Preserving Query Answering for Instance Checking in $\mathcal{EL}$;Web Reasoning and Rule Systems;2010
4. Survey of modular ontology techniques and their applications in the biomedical domain;Integrated Computer-Aided Engineering;2009-06-22
5. Security in Semantic Interoperation;Handbook of Research on Social Dimensions of Semantic Technologies and Web Services;2009