International audienceXML access control requires the enforcement of highly expressive access control policies to support schema-, document and object-specific protection requirements. Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access policies to compute secure user views on XML data sets. User queries are then evaluated on those views. In the second category of approaches, authorization rules are used to transform user queries to be evaluated against the original XML data set. The pros and cons for these approaches have been widely discussed in the framework of XML access control standardization activities. The aim...
Axml(T) is a logic-based formal language of authorisation for documents written in the Extensible Ma...
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access ...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
International audienceXML access control requires the enforcement of highly expressive access contro...
XML access control requires the enforcement of highly expressive access control policies to support ...
Access control models for XML data can be classified in two major categories: node filtering and que...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
Abstract. Due to the growing interest in XML security, various ac-cess control schemes have been pro...
In the last few years, an increasing amount of si-structured data have become available electronical...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Being able to express and enforce role-based access control on XML data is a critical component of X...
Axml(T) is a logic-based formal language of authorisation for documents written in the Extensible Ma...
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access ...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...
International audienceXML access control requires the enforcement of highly expressive access contro...
XML access control requires the enforcement of highly expressive access control policies to support ...
Access control models for XML data can be classified in two major categories: node filtering and que...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
Abstract. Due to the growing interest in XML security, various ac-cess control schemes have been pro...
In the last few years, an increasing amount of si-structured data have become available electronical...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Being able to express and enforce role-based access control on XML data is a critical component of X...
Axml(T) is a logic-based formal language of authorisation for documents written in the Extensible Ma...
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access ...
XML repositories are increasingly becoming popular to store data or as an interoperability layer for...