We introduce the notion of views as a mechanism for securing and providing access control in the context of XML. Research in XML has explored several efficient querying mechanisms. Hiding sensitive data from unauthorized users is as important as supporting efficient querying of visible data. However, given the semi-structured nature of XML data, this is non-trivial, as access control can be applied on the values of nodes as well as on the structural relationship between nodes. In this context, we present an algebraic security view specification language SSX for DBAs to specify security constraints for different user groups. A Security Annotated Schema (SAS) is proposed as the internal representation for the security views and can be automat...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceXML access control requires the enforcement of highly expressive access contro...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Being able to express and enforce role-based access control on XML data is a critical component of X...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
International audienceWe study the problem of querying virtual security views of XML data that has r...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Since XML is used as a storage format in an increasing number of applications, security has become a...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
International audienceIn this paper, we revisit the view based security framework for XML without im...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceXML access control requires the enforcement of highly expressive access contro...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Being able to express and enforce role-based access control on XML data is a critical component of X...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
International audienceWe study the problem of querying virtual security views of XML data that has r...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
Since XML is used as a storage format in an increasing number of applications, security has become a...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
International audienceIn this paper, we revisit the view based security framework for XML without im...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
In the last few years, an increasing amount of si-structured data have become available electronical...
International audienceXML access control requires the enforcement of highly expressive access contro...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...