International audienceIt is increasingly common to find XML views used to enforce access control as found in many applications and commercial database systems. To overcome the overhead of view materialization and maintenance, XML views are necessarily virtual. With this comes the need for answering XML queries posed over virtual views, by rewriting them into equivalent queries on the underlying documents. A major concern here is that query rewriting for recursive XML views is still an open problem, and proposed approaches deal only with non-recursive XML views. Moreover, a small number of works have studied the access rights for updates. In this paper, we present SVMAX (Secure and Valid MAnipulation of XML), the first system that supports s...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
In the last few years, an increasing amount of si-structured data have become available electronical...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
National audienceOver the past years several works have proposed access control models for XML data ...
International audienceWe study the problem of querying virtual security views of XML data that has r...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We study the problem of updating XML repository through security views. Users are provided with the ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
In the last few years, an increasing amount of si-structured data have become available electronical...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
National audienceOver the past years several works have proposed access control models for XML data ...
International audienceWe study the problem of querying virtual security views of XML data that has r...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We study the problem of updating XML repository through security views. Users are provided with the ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
In the last few years, an increasing amount of si-structured data have become available electronical...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...