Foundations of Databases, 1995. ,
Rewriting queries using views in the presence of arithmetic comparisons ,
Rewriting queries using views with negation ,
TRBAC, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, p.2130, 2000. ,
DOI : 10.1145/344287.344298
An access control model supporting periodicity constraints and temporal reasoning, ACM Transactions on Database Systems, vol.23, issue.3, pp.231-285, 1998. ,
DOI : 10.1145/293910.293151
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.25.9748
Administration policies in a multipolicy autorization system, DBSec, p.341355, 1997. ,
Secure computer system : Unied exposition and multics interpretation, 1976. ,
Database security - concepts, approaches, and challenges, IEEE Transactions on Dependable and Secure Computing, vol.2, issue.1, pp.219-74, 2005. ,
DOI : 10.1109/TDSC.2005.9
Towards materialized view selection for distributed databases, Proceedings of the 12th International Conference on Extending Database Technology Advances in Database Technology, EDBT '09, p.10881099, 2009. ,
DOI : 10.1145/1516360.1516484
Logic-based approach to semantic query optimization, ACM Trans. Database Syst, vol.15, issue.2, p.162207, 1990. ,
Eectively and eciently selecting access control rules on materialized views over relational databases, IDEAS, p.225235, 2010. ,
Optimizing queries with materialized views, Proceedings of the Eleventh International Conference on Data Engineering, 1995. ,
DOI : 10.1109/ICDE.1995.380392
Optimal implementation of conjunctive queries in relational data bases, STOC, p.7790, 1977. ,
Adorbac : an administration model for or-bac, Comput. Syst. Sci. Eng, vol.19, issue.3, 2004. ,
Rewriting queries with arbitrary aggregation functions using views, ACM Transactions on Database Systems, vol.31, issue.2 ,
DOI : 10.1145/1138394.1138400
GEO-RBAC, ACM Transactions on Information and System Security, vol.10, issue.1, 2007. ,
DOI : 10.1145/1210263.1210265
Answering recursive queries using views, PODS, p.109116, 1997. ,
Assessing query privileges via safe and ecient permission composition, ACM Conference on Computer and Communications Security, p.311322, 2008. ,
Information Technology Security Evaluation Criteria (ITSEC) Commission of the European Communities, 1991. ,
Secure XML querying with security views, Proceedings of the 2004 ACM SIGMOD international conference on Management of data , SIGMOD '04, p.587598, 2004. ,
DOI : 10.1145/1007568.1007634
Role-based access controls. CoRR, abs/0903, 2009. ,
Proposed nist standard for role-based access control, ACM Trans. Inf. Syst. Secur, vol.4, issue.3, p.224274, 2001. ,
Protection : principles and practice, AFIPS Spring Joint Computing Conference, p.417429, 1972. ,
Adapting materialized views after redenitions ,
DOI : 10.1145/568271.223817
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.103.7060
Xml security views revisited, DBPL, p.5267, 2009. ,
An authorization mechanism for a relational database system, ACM Trans. Database Syst, vol.1, issue.3, p.242255, 1976. ,
Answering queries using views : A survey, VLDB J, vol.10, issue.4, p.270294, 2001. ,
Protection in operating systems, Commun. ACM, vol.19, issue.8, p.461471, 1976. ,
A Linear time algorithm for deciding security, 17th Annual Symposium on Foundations of Computer Science (sfcs 1976), p.3341, 1976. ,
DOI : 10.1109/SFCS.1976.1
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems, Proceedings of the second ACM workshop on Role-based access control , RBAC '97 ,
DOI : 10.1145/266741.266749
Querying heterogeneous information sources using source descriptions, VLDB, pp.251262-251278, 1996. ,
An access authorization model for relational databases based on algebraic manipulation of view denitions, ICDE, p.339347, 1989. ,
A formal framework for reective database access control policies, ACM Conference on Computer and Communications Security, p.289298, 2008. ,
Database security Advances in Computers, pp.1-72, 1994. ,
A scalable algorithm for answering queries using views, VLDB, pp.484495-484517, 2000. ,
A Pragmatic Approach to Conceptual Modeling of OLAP Security, Proc. ER, p.311 ,
DOI : 10.1007/3-540-45581-7_24
Query folding, ICDE, p.4855, 1996. ,
Extending query rewriting techniques for ne-grained access control, SIGMOD Conference, pp.551562-77, 2004. ,
View security as the basis for data warehouse security, DMDW, page 8, 2000. ,
Administering Permissions for Distributed Data: Factoring and Automated Inference, DB- Sec, p.91104, 2001. ,
DOI : 10.1007/978-0-387-35587-0_7
Security Administration for Federations, Warehouses, and Other Derived Data ,
DOI : 10.1007/978-0-387-35508-5_14
Lattice-based access control models, Computer, vol.26, issue.11, p.919, 1993. ,
DOI : 10.1109/2.241422
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.5742
Role-based access control models, Computer, vol.29, issue.2, pp.3847-77, 1996. ,
DOI : 10.1109/2.485845
Answering queries with aggregation using views, VLDB, p.318329, 1996. ,
Identifying Security Holes in OLAP Applications, DBSec, volume 201 of IFIP Conference Proceedings, p.283294, 2000. ,
DOI : 10.1007/0-306-47008-X_25
Access control in a relational data base management system by query modication, Proceedings of the, p.180186, 1974. ,
Equivalence among relational expressions with the union and dierence operation, VLDB, p.535548, 1978. ,
Task-based authorization controls (tbac) : A family of models for active and enterpriseoriented autorization management ,
Dynamic Data Warehouse Design, 1st Int. Conf. on DaWak '99, 1999. ,
DOI : 10.1007/3-540-48298-9_1
The gmap : A versatile tool for physical data independence ,
Information integration using logical views, ICDT, 1940. ,
Rewriting Unions of General Conjunctive Queries Using Views, Proc. Conf. on Extending Database Technology, 2002. ,
DOI : 10.1007/3-540-45876-X_6
On the correctness criteria of ne-grained access control in relational databases, VLDB '07 : Proceedings of the 33rd international conference on Very large data bases, p.555566, 2007. ,
Algorithms for materialized view design in data warehousing environment, VLDB, p.136145, 1997. ,
Query transformation for psjqueries, Proceedings of 13th International Conference on Very Large Data Bases, p.245254, 1987. ,