Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Samarati, Pierangela
add a person with the name Samarati, Pierangela
 

Other publications of authors with the same name

A new Authorization Model for Object-Oriented Databases., , and . DBSec, volume A-60 of IFIP Transactions, page 199-222. North-Holland, (1994)XML Access Control Systems: A Component-Based Approach., , , and . DBSec, volume 201 of IFIP Conference Proceedings, page 39-50. Kluwer, (2000)Panel Discussion: Role-Based Access Control and Next-Generation Security Models., , , , , , and . DBSec, volume 51 of IFIP Conference Proceedings, page 289-298. Chapman & Hall, (1995)Security Issues in Data Warehousing and Data Mining: Panel Discussion., , , , , and . DBSec, volume 113 of IFIP Conference Proceedings, page 3-16. Chapman & Hall, (1997)XML access control systems: a component-based approach., , , and . Informatica (Slovenia), (2002)Access control policies and languages., , , and . IJCSE, 3 (2): 94-102 (2007)A fine-grained access control system for XML documents., , , and . ACM Trans. Inf. Syst. Secur., 5 (2): 169-202 (2002)Advances in Access Control Policies., , , , , , , and . Privacy and Identity Management for Life, Springer, (2011)Database Security., , , and . Addison-Wesley & ACM Press, (1995)Access Control Policies and Languages in Open Environments., , , and . Secure Data Management in Decentralized Systems, volume 33 of Advances in Information Security, Springer, (2007)