National audienceOver the past years several works have proposed access control models for XML data where only read-access rights over non-recursive DTDs are considered. A small number of works have studied the access rights for updates. In this paper, we present a general model for specifying access control on XML data in the presence of the update operations of W3C XQuery Update Facility. Our approach for enforcing such update spec- ification is based on the notion of query rewriting. A major issue is that query rewriting for recursive DTDs is still an open problem. We show that this limitation can be avoided using only the expressive power of the standard XPath, and we propose a linear algorithm to rewrite each update operation defined o...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceWe study the problem of querying virtual security views of XML data that has r...
XML access control requires the enforcement of highly expressive access control policies to support ...
National audienceOver the past years several works have proposed access control models for XML data ...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
We study the problem of updating XML repository through security views. Users are provided with the ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceWe study the problem of querying virtual security views of XML data that has r...
XML access control requires the enforcement of highly expressive access control policies to support ...
National audienceOver the past years several works have proposed access control models for XML data ...
International audienceOver the past years several works have proposed access con- trol models for XM...
Over the past years several works have proposed access control models for XML data where only read-a...
International audienceIt is increasingly common to find XML views used to enforce access control as ...
We study the problem of updating XML repository through security views. Users are provided with the ...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceWe study the problem of querying virtual security views of XML data that has r...
XML access control requires the enforcement of highly expressive access control policies to support ...