Ye et al., 2011 - Google Patents
Improving web service security and privacyYe et al., 2011
View PDF- Document ID
- 12658668871916456196
- Author
- Ye X
- Zhong L
- Publication year
- Publication venue
- 2011 IEEE World Congress on Services
External Links
Snippet
This paper proposes a scheme that allows the webservice providers to carry out fine-grained access control onthe data hosted by them. Through data tracking, the schemealso automatically detects the data flows that might lead toattacks on online services. Compared …
- 238000011012 sanitization 0 description 31
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
Hu et al. | Assessment of access control systems | |
Schultz et al. | IFDB: decentralized information flow control for databases | |
Brucker et al. | Extending access control models with break-glass | |
Ulusoy et al. | GuardMR: Fine-grained security policy enforcement for MapReduce systems | |
Gladney | Access control for large collections | |
KR20060061820A (en) | Implementation and method and system of PI data access control function using personally identifiable information label and purpose serving function set | |
Xue et al. | GuardSpark++: Fine-grained purpose-aware access control for secure data sharing and analysis in Spark | |
Erraissi et al. | A big data security layer meta-model proposition | |
Ye et al. | Improving web service security and privacy | |
Ambhore et al. | A implementation of object oriented database security | |
Alghathbar et al. | Securing UML information flow using FlowUML | |
Bichhawat et al. | Contextual and granular policy enforcement in database-backed applications | |
Baraani-Dastjerdi et al. | Security in databases: A survey study | |
Glukharev et al. | Access Differentiation in Object-Oriented Databases Based on the Extended Object-Oriented Harrison–Ruzzo–Ullman Model | |
El Ouazzani et al. | Dynamic management of data warehouse security levels based on user profiles | |
Elouazzani et al. | User Profile Management to protect sensitive data in Warehouses | |
Levin et al. | Design principles and guidelines for security | |
Chen et al. | A practical aspect framework for enforcing fine-grained access control in web applications | |
Kim et al. | Describing access control models as design patterns using roles | |
Pereira et al. | Role-based access control mechanisms | |
Fatema | Adding privacy protection to policy based authorisation systems | |
Marriott | Management policy specification | |
Maamir et al. | Fine granularity access rights for information flow control in object oriented systems | |
Ye et al. | Providing Access Control through Program Transformation |