dc.creator | Sasaoka L.K. | |
dc.creator | Medeiros C.B. | |
dc.date | 2006 | |
dc.date | 2015-06-30T18:12:44Z | |
dc.date | 2015-11-26T14:27:31Z | |
dc.date | 2015-06-30T18:12:44Z | |
dc.date | 2015-11-26T14:27:31Z | |
dc.date.accessioned | 2018-03-28T21:30:40Z | |
dc.date.available | 2018-03-28T21:30:40Z | |
dc.identifier | 3540477039; 9783540477037 | |
dc.identifier | Lecture Notes In Computer Science (including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics). , v. 4231 LNCS, n. , p. 110 - 119, 2006. | |
dc.identifier | 3029743 | |
dc.identifier | | |
dc.identifier | http://www.scopus.com/inward/record.url?eid=2-s2.0-33845193500&partnerID=40&md5=ab883533b13077c277269f9cf611bbf2 | |
dc.identifier | http://www.repositorio.unicamp.br/handle/REPOSIP/103515 | |
dc.identifier | http://repositorio.unicamp.br/jspui/handle/REPOSIP/103515 | |
dc.identifier | 2-s2.0-33845193500 | |
dc.identifier.uri | http://repositorioslatinoamericanos.uchile.cl/handle/2250/1246362 | |
dc.description | The problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation. © Springer-Verlag Berlin Heidelberg 2006. | |
dc.description | 4231 LNCS | |
dc.description | | |
dc.description | 110 | |
dc.description | 119 | |
dc.description | Ashby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D., (1996) Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria, , [AJS+96]. Technical Report 001-005, National Computer Security Center. 75 pages | |
dc.description | Belussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A., An authorization model for geographical maps (2004) Proc. 14th ACM GIS, pp. 82-91. , [BBC+04], november | |
dc.description | Bertino, E., Bonatti, P., Ferrari, E., TRBAC: Temporal role-based access control model (2001) ACM Transactions on Information and System Security, 4 (3), pp. 191-223. , [BBF01] | |
dc.description | Bertino, E., Catania, B., Damiani, M., Perlasca, P., GEO-RBAC: A spatially aware RBAC (2005) Proc, 10th ACM Symposium on Access Control, pp. 29-37. , [BCDP05] | |
dc.description | June | |
dc.description | Bertino, E., Castano, S., Ferrari, E., Mesiti, M., Specifying and enforcing access control policies for XML document sources (2000) World Wide Web, 3 (3), pp. 139-151. , [BCFM00] | |
dc.description | Baraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R., (1996) Security in Databases: A Survey Study, , http://citeseer.nj.nec.com/baraani-dastjerdi96security.html, [BDPSN96]. February: 1-39 | |
dc.description | Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K., An access control model for video database systems (2000) CIKM, pp. 336-343. , [BHAE00] | |
dc.description | Bertino, E., Jajodia, S., Samarati, P., Database security - Research and practice (1995) Information Systems, 20 (7), pp. 537-556. , [BJS95] | |
dc.description | Bell, D.E., La Padula, L.J., (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation, , [BP76]. Technical report, The Mitre Corp | |
dc.description | Clementini, E., Di Felice, P., Van Oosterom, P., A small set of formal topological relationships suitable for end-user interaction (1993) Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277-295. , [CdFvO93] | |
dc.description | Ferraiolo, D., Kuhn, R., Role-based access control (1992) Proceedings of 15th National Computer Security Conference, , [FK92] | |
dc.description | Griffiths, P.G., Wade, B., An authorization mechanism for a relational dabase system (1976) ACM TODS, 1 (3), pp. 243-255. , [GW76] | |
dc.description | Magalhaes, G.C., Telecommunications outside plant management throughout Brazil (1997) Proc GITA 1997, , [Mag97] | |
dc.description | Park, J., Sandhu, R., Ahn, G., Role-based access control on the web (2001) ACM Transactions on Information and System Security, 4 (1), pp. 37-71. , [PSA01] | |
dc.description | http://www.cpqdusa.com/solutions/outside.html, [Sag] Sagre, accessed on April 2006Sasaoka, L.K., (2002) Access Control in Geographic Databases, , [Sas02]. Master's thesis, Universidade Estadual de Campinas, June. In Portuguese | |
dc.description | Ye, W., Heidemann, J., Estrin, D., Medium access control with coordinated adaptive sleeping for wireless sensor networks (2004) IEEE/ACM Transactions on Networking, 12 (3), pp. 493-506. , [WHE04] | |
dc.language | en | |
dc.publisher | | |
dc.relation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.rights | fechado | |
dc.source | Scopus | |
dc.title | Access Control In Geographic Databases | |
dc.type | Actas de congresos | |