共 50 条
- [2] Confidentiality policies and their enforcement for controlled query evaluation [J]. COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 39 - 54
- [3] Authorization Enforcement Detection [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
- [4] Authorization Constraints Specification and Enforcement [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
- [5] ThunQ: A Distributed and Deep Authorization Middleware for Early and Lazy Policy Enforcement in Microservice Applications [J]. SERVICE-ORIENTED COMPUTING (ICSOC 2021), 2021, 13121 : 204 - 220
- [6] Distributed query evaluation on semistructured data [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2002, 27 (01): : 1 - 62
- [7] Accelerating Partial Evaluation in Distributed SPARQL Query Evaluation [J]. 2019 IEEE 35TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2019), 2019, : 112 - 123
- [8] Distributed Authorization with Distributed Grammars [J]. PROGRAMMING LANGUAGES WITH APPLICATIONS TO BIOLOGY AND SECURITY: ESSAYS DEDICATED TO PIERPAOLO DEGANO ON THE OCCASION OF HIS 65TH BIRTHDAY, 2015, 9465 : 10 - 26
- [9] Distributed Programming with Distributed Authorization [J]. TLDI '10: PROCEEDINGS OF THE 2010 ACM SIGPLAN WORKSHOP ON TYPES IN LANGUAGE DESIGN AND IMPLEMENTATION, 2010, : 27 - 38
- [10] A pipelined architecture for distributed text query evaluation [J]. Information Retrieval, 2007, 10 : 205 - 231