• Publications
  • Influence
A generalized temporal role-based access control model
tl;dr
We propose a generalized temporal role-based access control (GTRBAC) model capable of expressing a wider range of temporal constraints. Expand
  • 618
  • 60
  • Open Access
TRBAC: a temporal role-based access control model
Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles can be active at certain time periods and non active at others; moreover,Expand
  • 358
  • 56
  • Open Access
GEO-RBAC: a spatially aware RBAC
tl;dr
We present GEO-RBAC, an extension of the RBAC model to deal with spatial and location-based information, using spatial entities, user positions, and geographically bounded roles. Expand
  • 456
  • 45
  • Open Access
The specification and enforcement of authorization constraints in workflow management systems
tl;dr
A language to express both static and dynamic authorization constraints as clauses in a logic program; (2) provide formal notions of constraint consistency; and (3) propose algorithms to check the consistency of constraints and assign users and roles to tasks that constitute the workflow in such a way that no constraints are violated. Expand
  • 580
  • 38
  • Open Access
State-of-the-art in privacy preserving data mining
tl;dr
We provide here an overview of the new and rapidly emerging research area of privacy preserving data mining. Expand
  • 886
  • 34
  • Open Access
Secure and selective dissemination of XML documents
tl;dr
We define a formal model of access control policies for XML documents and propose an approach to secure and selective dissemination of XML documents, based on the Cryptolope#8482; approach. Expand
  • 347
  • 34
  • Open Access
Efficient k -Anonymization Using Clustering Techniques
tl;dr
In this paper we propose an approach that uses the idea of clustering to minimize information loss and thus ensure good data quality. Expand
  • 275
  • 32
  • Open Access
Association rule hiding
tl;dr
We present three strategies and five algorithms for hiding a group of association rules, which is characterized as sensitive. Expand
  • 534
  • 29
  • Open Access
TRBAC: A temporal role-based access control model
Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles may be available to users at certain time periods, and unavailable atExpand
  • 534
  • 28
  • Open Access
Database security - concepts, approaches, and challenges
tl;dr
We discuss the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. Expand
  • 430
  • 28
  • Open Access