International audienceXML became the de facto standard for the data representation and exchange on the internet. Regarding XML documents access control policy definition, OASIS ratified the XACML standard. It is a declarative language allowing the specification of authorizations as rules. Furthermore, it is common to formally represent XML documents as labeled trees and to handle secure requests through “user views”. A user view is the part of the document accessible to a given user according to the existing policy. Moreover, control access polices can be depicted as annotated rules where annotations define for each document node whether it is accessible. Hence, an annotated schema is a formal representation of “user views”. Our main contri...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
Abstract: Today, when organizations perform access control over their resources they are not only in...
International audienceXML became the de facto standard for the data representation and exchange on t...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
With an increasing amount of semi-structured data, XML has become significant to humans and programs...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
Axml(T) is a logic-based formal language of authorisation for documents written in the Extensible Ma...
Web-based applications greatly increase information availability and ease of access, which is optima...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
With the widespread use of web services, there is a need for adequate security and privacy support t...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
Abstract: Today, when organizations perform access control over their resources they are not only in...
International audienceXML became the de facto standard for the data representation and exchange on t...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
With an increasing amount of semi-structured data, XML has become significant to humans and programs...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
We propose a formal account of XACML, an OASIS standard adhering to the Policy Based Access Control ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
One of the most important features of XML-based Web services is that they can be easily accessed ove...
Axml(T) is a logic-based formal language of authorisation for documents written in the Extensible Ma...
Web-based applications greatly increase information availability and ease of access, which is optima...
The aim of this paper is to investigate the security issue of the XML documents. We discuss a protec...
With the widespread use of web services, there is a need for adequate security and privacy support t...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
More and more information is distributed in XML format, both on corporate Intranets and on the globa...
Abstract: Today, when organizations perform access control over their resources they are not only in...