We consider the problem of extending XML databases with fine-grained, high-level access control policies specified using XPath expressions. Most prior work checks individual updates dynami-cally, which is expensive (requiring worst-case execution time pro-portional to the size of the database). On the other hand, static enforcement can be performed without accessing the database but may be incomplete, in the sense that it may forbid accesses that dynamic enforcement would allow. We introduce topological char-acterizations of XPath fragments in order to study the problem of determining when an access control policy can be enforced stat-ically without loss of precision. We introduce the notion of fair policies that are statically enforceable,...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
XPath is a W3C standard that plays a crucial role in several influential query, transformation, and ...
Abstract. XML access control policies involving updates may contain security flaws, here called inco...
AbstractWe consider the problem of deciding whether a fine-grained access control policy for tree up...
Recently, access control on XML data has become an important research topic. Previous research on ac...
Whenever multiple users modify XML documents concurrently, access control and synchronization of rea...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
XPath is a W3C standard that plays a crucial role in several influential query, transformation, and ...
Abstract. XML access control policies involving updates may contain security flaws, here called inco...
AbstractWe consider the problem of deciding whether a fine-grained access control policy for tree up...
Recently, access control on XML data has become an important research topic. Previous research on ac...
Whenever multiple users modify XML documents concurrently, access control and synchronization of rea...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...