We study the problem of updating XML repository through security views. Users are provided with the view of the repository schema they are entitled to see. They write update requests over their view using the XUpdate language. Each request is processed in two rewriting steps. First, the XPath expression selecting the nodes to update from the view is rewritten to another expression that only selects nodes the user is permitted to see. Second the XUpdate query is refined according to the write privileges held by the user
International audienceIn this paper, we revisit the view based security framework for XML without im...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
International audienceWe study the problem of querying virtual security views of XML data that has r...
XML access control requires the enforcement of highly expressive access control policies to support ...
National audienceOver the past years several works have proposed access control models for XML data ...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceIn this paper, we revisit the view based security framework for XML without im...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
International audienceWe study the problem of querying virtual security views of XML data that has r...
XML access control requires the enforcement of highly expressive access control policies to support ...
National audienceOver the past years several works have proposed access control models for XML data ...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceIn this paper, we revisit the view based security framework for XML without im...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
International audienceWe study the problem of querying virtual security views of XML data that has r...