Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access policies to compute secure user views on XML data sets. User queries are then evaluated on those views. In the second category of approaches, authorization rules are used to transform user queries to be evaluated against the original XML dataset. The aim of this paper is to describe a model combining the advantages of these approaches and overcoming their limitations. The model specification is given using a Finite State Automata, ensuring generality and easiness of standardization w.r.t. specific implementation techniques
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
International audienceIn this paper, we revisit the view based security framework for XML without im...
XML access control requires the enforcement of highly expressive access control policies to support ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We study the problem of updating XML repository through security views. Users are provided with the ...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-l...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
In the last few years, an increasing amount of si-structured data have become available electronical...
The evolution of web technologies and social trends fostered a shift from traditional enterprise dat...
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access ...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
International audienceIn this paper, we revisit the view based security framework for XML without im...
XML access control requires the enforcement of highly expressive access control policies to support ...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We study the problem of updating XML repository through security views. Users are provided with the ...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-l...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
In the last few years, an increasing amount of si-structured data have become available electronical...
The evolution of web technologies and social trends fostered a shift from traditional enterprise dat...
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access ...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
International audienceIn this paper, we revisit the view based security framework for XML without im...