Abstract. Due to the growing interest in XML security, various access control schemes have been proposed recently. However, little effort has been put forth to facilitate a uniform analysis and comparison of these schemes under the same framework. This paper presents a first attempt toward a flexible framework that can capture the design principles and operations of existing XML access control mechanisms. Under this framework, we observe that most existing XML access control mechanisms share the same design principle with slightly different orderings of underlying building blocks (i.e., data, query, and access control rule). Furthermore, according to the framework, we identify four plausible approaches to implement XML access controls, name...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
Abstract. Due to the growing interest in XML security, various ac-cess control schemes have been pro...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
International audienceXML access control requires the enforcement of highly expressive access contro...
International audienceXML access control requires the enforcement of highly expressive access contro...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Web-based applications greatly increase information availability and ease of access, which is optima...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract. XML has been widely adopted for Web data representation under various applications (such a...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
Abstract. Due to the growing interest in XML security, various ac-cess control schemes have been pro...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
International audienceXML access control requires the enforcement of highly expressive access contro...
International audienceXML access control requires the enforcement of highly expressive access contro...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Web-based applications greatly increase information availability and ease of access, which is optima...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract. XML has been widely adopted for Web data representation under various applications (such a...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...