SBBD

Paper Registration

1

Select Book

2

Select Paper

3

Fill in paper information

4

Congratulations

Fill in your paper information

English Information

(*) To change the order drag the item to the new position.

Authors
# Name
1 Grettel Monteagudo Garcia(ggarcia@tecgraf.puc-rio.br)
2 Javier Guillot Jiménez(jguillot@inf.puc-rio.br)
3 Yenier Torres Izquierdo(ytorres@tecgraf.puc-rio.br)
4 Ângelo Batista Neves Júnior(angeloneves@tecgraf.puc-rio.br)
5 Melissa Lemos(melissa@tecgraf.puc-rio.br)
6 Marco Antonio Casanova(casanova@inf.puc-rio.br)
7 Ana Cristina Ferreira(ana.ferreira@petrobras.com.br)
8 Flavia Pacheco Texeira da Silva(fpacheco@petrobras.com.br)

(*) To change the order drag the item to the new position.

Reference
# Reference
1 Bertino, E., Bonatti, P. A., and Ferrari, E. (2000). Trbac: a temporal role-based access control model. RBAC ’00: Proceedings of the fifth ACM workshop on Role-based access control, pages 21–30.
2 Bertino, E., Ghinita, G., and Kamra, A. (2011). Access control for databases: Concepts and systems. Foundations and Trends® in Databases, 3:1–148.
3 Bertino, E. and Sandhu, R. (2005). Database security-concepts, approaches, and chal- lenges. IEEE Transactions on Dependable and Secure Computing, 2:2–18.
4 Damiani, M. L., Bertino, E., Catania, B., and Perlasca, P. (2007). Geo-rbac: A spatially aware rbac. ACM Transactions on Information and System Security (TISSEC), 10.
5 Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R. (2001). Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4:224–274.
6 García, G. M. (2020). A Keyword-based Query Processing Method for Datasets with Schemas. PhD thesis, Thesis presented to the Graduate Program in Informatics, PUC- Rio (March 2020).
7 Izquierdo, Y. T., Garcia, G. M., Lemos, M., Novello, A., Novelli, B., Damasceno, C., Leme, L. A. P. P., and Casanova, M. A. (2021). A platform for keyword search and its application for covid-19 pandemic data. Journal of Information and Data Management, 12(5).
8 Izquierdo, Y. T., García, G. M., Lemos, M., Novello, A. F., Novelli, B., Damasceno, C., Leme, L. A. P. P., and Casanova, M. A. (2020). Keyword search over the covid-19 data. In SBBD, pages 205–210.
9 Jabal, A. A., Davari, M., Bertino, E., Makaya, C., Calo, S., Verma, D., Russo, A., and Williams, C. (2019). Methods and tools for policy analysis. ACM Comput. Surv, 51.
10 Kumar, M. and Newman, R. E. (2006). Strbac - an approach towards spatio-temporal role-based access control. Communication, Network, and Information Security, 155.
11 Sandhu, R., Ferraiolo, D., and Kuhn, R. (2000). The nist model for role-based access control: Towards a unified standard. ACM workshop on Role-based access control, 10.
12 Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). Computer role-based access control models. Computer, 29:38–47.