Protecting data over the web is today a crucial need for many companies and organizations. This requires not only the use of cryptographic and digital signature techniques for protecting data during transmission, but also the development of suitable access control models and mechanisms able to support the specification and enforcement of a variety of access control policies. In this paper, we first discuss which are the main access control requirements for web data, and compare some of the most important research proposals with respect to these requirements. We then present Author-X [6] as an example of comprehensive system for controlling access to web data.Protecting data over the web is today a crucial need for many companies and organiz...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Web-based applications greatly increase information availability and ease of access, which is optima...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
With the ever increasing demand for the Web-based applications over the Internet, the related securi...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
In the last weeks and month, we have seen different proposals and collections of requirements for XM...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Protecting data over the web is today a crucial need for many companies and organizations. This requ...
Web-based applications greatly increase information availability and ease of access, which is optima...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
International audienceThe erosion of trust put in traditional database servers and in Database Servi...
With the ever increasing demand for the Web-based applications over the Internet, the related securi...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
In the last weeks and month, we have seen different proposals and collections of requirements for XM...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
The erosion of trust put in traditional database servers and in Database Service Providers, the grow...
As organizations depend on, possibly distributed, information systems for operational, decisional an...