We consider the problem of extending XML databases with fine-grained, high-level access control policies specified using XPath expressions. Most prior work checks individual updates dynami-cally, which is expensive (requiring worst-case execution time pro-portional to the size of the database). On the other hand, static enforcement can be performed without accessing the database but may be incomplete, in the sense that it may forbid accesses that dynamic enforcement would allow. We introduce topological char-acterizations of XPath fragments in order to study the problem of determining when an access control policy can be enforced stat-ically without loss of precision. We introduce the notion of fair policies that are statically enforceable,...
Abstract: We consider the setting of secure publishing of XML documents, in which read-only access c...
AbstractWe consider the problem of deciding whether a fine-grained access control policy for tree up...
Dynamic constraints such as Separation of Duty (SoD) prevent the possibility of frauds and enable fl...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract. XML access control policies involving updates may contain security flaws, here called inco...
XPath is a W3C standard that plays a crucial role in several influential query, transformation, and ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Recently, access control on XML data has become an important research topic. Previous research on ac...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Whenever multiple users modify XML documents concurrently, access control and synchronization of rea...
National audienceOver the past years several works have proposed access control models for XML data ...
Abstract: We consider the setting of secure publishing of XML documents, in which read-only access c...
AbstractWe consider the problem of deciding whether a fine-grained access control policy for tree up...
Dynamic constraints such as Separation of Duty (SoD) prevent the possibility of frauds and enable fl...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
Access control policies for XML typically use regular path expressions such as XPath for specifying ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract. XML access control policies involving updates may contain security flaws, here called inco...
XPath is a W3C standard that plays a crucial role in several influential query, transformation, and ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Recently, access control on XML data has become an important research topic. Previous research on ac...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Whenever multiple users modify XML documents concurrently, access control and synchronization of rea...
National audienceOver the past years several works have proposed access control models for XML data ...
Abstract: We consider the setting of secure publishing of XML documents, in which read-only access c...
AbstractWe consider the problem of deciding whether a fine-grained access control policy for tree up...
Dynamic constraints such as Separation of Duty (SoD) prevent the possibility of frauds and enable fl...