
efficiency improvements will be conducted. Temporal constraints of access control
will also be integrated into the model.
References
1. E. Bertino and E. Ferrari, “Secure and selective dissemination of XML documents”, ACM
Transactions on Information and System Security (TISSEC), Vol. 5, No. 3, pp. 290-331,
August 2002.
2. S. A. Chun and V. Atluri, “Protecting Privacy from Continuous High-resolution Sattellite
Surveillance”, Data and Application Security: Developments and Directions, (eds.) Bhavani
Thuraisingham, R. Van de Riet, K. R. Dittrich and Z. Tari, Kluwer Academic Publishers,
2001.
3. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, “A Fine-Grained
Access Control System for XML Documents” ACM Transactions on Information and
System Security (TISSEC), Vol. 5, No. 2, pp. 169-202, May 2002.
4. E. Damiani, S. De Capitani di Vimercati, E. Fernandez-Medina, and P. Samarati, “An
Access Control Sytem for SVG Documents”, 16-th IFIP Conference on Data and
Application Security, University of Cambridge, UK, July 2002.
5. S. De Capitani di Vimercati, “An Authorization Model for Temporal XML Documents”,
Proc. of the 17th ACM Symposium on Applied Computing, Madrid, Spain, March 2002.
6. R. George, " GIS meets XML: SVG - Scalable Vector Graphics", http://www.web-
maps.com/svg-gis.html, 2001.
7. S. Kakumoto, Y.Kosugi, M.Hatayama and H.Kameda, “Development of Spatial Temporal
Geographic Information System”, Technical Report of the Geographical Survey Institute / 1-
No.275-2, March 2002.
8. N. Kodali and D.Wijeseker, “Regulating Access to SMIL formatted Pay-per-view Movies”,
ACM Workshop on XML Security, George Mason University, Fairfax VA, USA November
2002.
9. S. Osborn and Y. Guo, “Modeling Users in Role-Based Access Control” Fifth ACM
Workshop on Role-Based Access Control, Berlin, July 2000.
10. P. van Oosterom. “The Reactive-tree: A Storage Structure for a Seamless, Scaleless
Geographic Database”, In proceedings Auto-Carto 10, Baltimore, March 1991.
11. Ph. Rigaux, M. Scholl, and A. Voisard, “Spatial Databases - with applications to
GIS”, Morgan Kaufmann, 2002.
12. P. Samarati and S. De Capitani di Vimercati, "Access Control: Policies, Models, and
Mechanisms" in Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri
(eds), LNCS 2171, Springer-Verlag 2001.
13. DBx Geomatics, SVG mapping, http://www.dbxgeomatics.com/svg.asp
14. FGDC “Homeland Security & GIS” http://www.fgdc.gov/publications/homeland.htm
15. W3C, Scalable Vector Graphics, http://www.w3.org/Graphics/SVG/
260