Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view must be adapted to reflect these changes. The process of updating a materialized view after its definition changes is referred to as view adaptation. While XPath security views have been widely reported in literature, the problem of view adaptation for XPath security views has not been addressed. View adaptation results in view downtime during which users are denied access to security views to prevent unauthorized access. Thus, efficient view adaptation is important for making XPath security views pragmatic. In this work, we show how to adapt an XPath access-contro...
We present a new approach for accelerating the execution of XPath expressions using parameterized ma...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
The increasing availability of XML-based data sources, e.g., for publishing data on the WWW, means t...
Since XML is used as a storage format in an increasing number of applications, security has become a...
In the past few years, with many organisations providing web services for business and communication...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceWe study the problem of querying virtual security views of XML data that has r...
We present a new approach for accelerating the execution of XPath expressions using parameterized ma...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
The increasing availability of XML-based data sources, e.g., for publishing data on the WWW, means t...
Since XML is used as a storage format in an increasing number of applications, security has become a...
In the past few years, with many organisations providing web services for business and communication...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
We consider the problem of extending XML databases with fine-grained, high-level access control poli...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceWe study the problem of querying virtual security views of XML data that has r...
We present a new approach for accelerating the execution of XPath expressions using parameterized ma...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....