1 |
Bertino, E., Bonatti, P. A., and Ferrari, E. (2000). Trbac: a temporal role-based access control model. RBAC ’00: Proceedings of the fifth ACM workshop on Role-based access control, pages 21–30.
|
|
2 |
Bertino, E., Ghinita, G., and Kamra, A. (2011). Access control for databases: Concepts and systems. Foundations and Trends® in Databases, 3:1–148.
|
|
3 |
Bertino, E. and Sandhu, R. (2005). Database security-concepts, approaches, and chal- lenges. IEEE Transactions on Dependable and Secure Computing, 2:2–18.
|
|
4 |
Damiani, M. L., Bertino, E., Catania, B., and Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security (TISSEC), 10.
|
|
5 |
Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R. (2001). Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4:224–274.
|
|
6 |
García, G. M. (2020). A Keyword-based Query Processing Method for Datasets with Schemas. PhD thesis, Thesis presented to the Graduate Program in Informatics, PUC- Rio (March 2020).
|
|
7 |
Izquierdo, Y. T., Garcia, G. M., Lemos, M., Novello, A., Novelli, B., Damasceno, C., Leme, L. A. P. P., and Casanova, M. A. (2021). A platform for keyword search and its application for covid-19 pandemic data. Journal of Information and Data Management, 12(5).
|
|
8 |
Izquierdo, Y. T., García, G. M., Lemos, M., Novello, A. F., Novelli, B., Damasceno, C., Leme, L. A. P. P., and Casanova, M. A. (2020). Keyword search over the covid-19 data. In SBBD, pages 205–210.
|
|
9 |
Jabal, A. A., Davari, M., Bertino, E., Makaya, C., Calo, S., Verma, D., Russo, A., and Williams, C. (2019). Methods and tools for policy analysis. ACM Comput. Surv, 51.
|
|
10 |
Kumar, M. and Newman, R. E. (2006). Strbac - an approach towards spatio-temporal role-based access control. Communication, Network, and Information Security, 155.
|
|
11 |
Sandhu, R., Ferraiolo, D., and Kuhn, R. (2000). The nist model for role-based access control: Towards a unified standard. ACM workshop on Role-based access control, 10.
|
|
12 |
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). Computer role-based access control models. Computer, 29:38–47.
|
|