XML access control requires the enforcement of highly expressive access control policies to support schema-, document and object-specific protection requirements. Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access policies to compute secure user views on XML data sets. User queries are then evaluated on those views. In the second category of approaches, authorization rules are used to transform user queries to be evaluated against the original XML data set. The pros and cons for these approaches have been widely discussed in the framework of XML access control standardization activities. The aim of this paper is to d...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
The evolution of web technologies and social trends fostered a shift from traditional enterprise dat...
Access control models for XML data can be classified in two major categories: node filtering and que...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We study the problem of updating XML repository through security views. Users are provided with the ...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
In the last few years, an increasing amount of si-structured data have become available electronical...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-l...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
The evolution of web technologies and social trends fostered a shift from traditional enterprise dat...
Access control models for XML data can be classified in two major categories: node filtering and que...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
We study the problem of updating XML repository through security views. Users are provided with the ...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
In the last few years, an increasing amount of si-structured data have become available electronical...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Abstract. Due to the growing interest in XML security, various access control schemes have been prop...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-l...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
The evolution of web technologies and social trends fostered a shift from traditional enterprise dat...