dc.creatorSasaoka L.K.
dc.creatorMedeiros C.B.
dc.date2006
dc.date2015-06-30T18:12:44Z
dc.date2015-11-26T14:27:31Z
dc.date2015-06-30T18:12:44Z
dc.date2015-11-26T14:27:31Z
dc.date.accessioned2018-03-28T21:30:40Z
dc.date.available2018-03-28T21:30:40Z
dc.identifier3540477039; 9783540477037
dc.identifierLecture Notes In Computer Science (including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics). , v. 4231 LNCS, n. , p. 110 - 119, 2006.
dc.identifier3029743
dc.identifier
dc.identifierhttp://www.scopus.com/inward/record.url?eid=2-s2.0-33845193500&partnerID=40&md5=ab883533b13077c277269f9cf611bbf2
dc.identifierhttp://www.repositorio.unicamp.br/handle/REPOSIP/103515
dc.identifierhttp://repositorio.unicamp.br/jspui/handle/REPOSIP/103515
dc.identifier2-s2.0-33845193500
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1246362
dc.descriptionThe problem of access control in databases consists of determining when (and if) users or applications can access stored data, and what kind of access they are allowed. This paper discusses this problem for geographic databases, where constraints imposed on access control management must consider the spatial location context. The model and solution provided are motivated by problems found in AM/FM applications developed in the management of telephone infrastructure in Brazil, in a real life situation. © Springer-Verlag Berlin Heidelberg 2006.
dc.description4231 LNCS
dc.description
dc.description110
dc.description119
dc.descriptionAshby, V., Jajodia, S., Smith, G., Wisseman, S., Wichers, D., (1996) Trusted Database Management Systems - Interpretation of the Trusted Computer System Evaluation Criteria, , [AJS+96]. Technical Report 001-005, National Computer Security Center. 75 pages
dc.descriptionBelussi, A., Bertino, E., Catania, B., Damiani, M., Nucita, A., An authorization model for geographical maps (2004) Proc. 14th ACM GIS, pp. 82-91. , [BBC+04], november
dc.descriptionBertino, E., Bonatti, P., Ferrari, E., TRBAC: Temporal role-based access control model (2001) ACM Transactions on Information and System Security, 4 (3), pp. 191-223. , [BBF01]
dc.descriptionBertino, E., Catania, B., Damiani, M., Perlasca, P., GEO-RBAC: A spatially aware RBAC (2005) Proc, 10th ACM Symposium on Access Control, pp. 29-37. , [BCDP05]
dc.descriptionJune
dc.descriptionBertino, E., Castano, S., Ferrari, E., Mesiti, M., Specifying and enforcing access control policies for XML document sources (2000) World Wide Web, 3 (3), pp. 139-151. , [BCFM00]
dc.descriptionBaraani-Dastjerdi, A., Pieprzyk, J., Safavi-Naini, R., (1996) Security in Databases: A Survey Study, , http://citeseer.nj.nec.com/baraani-dastjerdi96security.html, [BDPSN96]. February: 1-39
dc.descriptionBertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K., An access control model for video database systems (2000) CIKM, pp. 336-343. , [BHAE00]
dc.descriptionBertino, E., Jajodia, S., Samarati, P., Database security - Research and practice (1995) Information Systems, 20 (7), pp. 537-556. , [BJS95]
dc.descriptionBell, D.E., La Padula, L.J., (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation, , [BP76]. Technical report, The Mitre Corp
dc.descriptionClementini, E., Di Felice, P., Van Oosterom, P., A small set of formal topological relationships suitable for end-user interaction (1993) Proceedings of the 3rd Symposium Spatial Database Systems, pp. 277-295. , [CdFvO93]
dc.descriptionFerraiolo, D., Kuhn, R., Role-based access control (1992) Proceedings of 15th National Computer Security Conference, , [FK92]
dc.descriptionGriffiths, P.G., Wade, B., An authorization mechanism for a relational dabase system (1976) ACM TODS, 1 (3), pp. 243-255. , [GW76]
dc.descriptionMagalhaes, G.C., Telecommunications outside plant management throughout Brazil (1997) Proc GITA 1997, , [Mag97]
dc.descriptionPark, J., Sandhu, R., Ahn, G., Role-based access control on the web (2001) ACM Transactions on Information and System Security, 4 (1), pp. 37-71. , [PSA01]
dc.descriptionhttp://www.cpqdusa.com/solutions/outside.html, [Sag] Sagre, accessed on April 2006Sasaoka, L.K., (2002) Access Control in Geographic Databases, , [Sas02]. Master's thesis, Universidade Estadual de Campinas, June. In Portuguese
dc.descriptionYe, W., Heidemann, J., Estrin, D., Medium access control with coordinated adaptive sleeping for wireless sensor networks (2004) IEEE/ACM Transactions on Networking, 12 (3), pp. 493-506. , [WHE04]
dc.languageen
dc.publisher
dc.relationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.rightsfechado
dc.sourceScopus
dc.titleAccess Control In Geographic Databases
dc.typeActas de congresos


Este ítem pertenece a la siguiente institución