Whenever multiple users modify XML documents concurrently, access control and synchronization of read and update operations are required. We suggest to define access rights and locks at the level of node names that are defined in the DTD of the XML document. This allows us to normalize (a subset of) XPath expressions, used e.g. in queries, such that access control and synchronization can be performed at the level of node names too. Then we show that access control and locking at the level of node names can be solved by the same technique, i.e. the identification of corresponding node names of XPath expressions. Finally, we extend our approach to predicate filters that may be used in XPath expressions for both, access control and synchroniza...
Being able to express and enforce role-based access control on XML data is a critical component of X...
Recently, access control on XML data has become an important research topic. Previous research on ac...
International audienceOver the past years several works have proposed access con- trol models for XM...
The evaluation of XPath expressions plays a central role in accessing XML documents and therefore ma...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
National audienceOver the past years several works have proposed access control models for XML data ...
Abstract For concurrency control of XML data, this paper proposes a new locking method based on XPat...
Over the past years several works have proposed access control models for XML data where only read-a...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
Recently, access control on XML data has become an important research topic. Previous research on ac...
International audienceOver the past years several works have proposed access con- trol models for XM...
The evaluation of XPath expressions plays a central role in accessing XML documents and therefore ma...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
As Extensible Markup Language (XML) is becoming a de facto standard for the distribution and sharing...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
National audienceOver the past years several works have proposed access control models for XML data ...
Abstract For concurrency control of XML data, this paper proposes a new locking method based on XPat...
Over the past years several works have proposed access control models for XML data where only read-a...
XML, a self-describing and semi-structured data format, is becoming a standard to represent and exc...
Being able to express and enforce role-based access control on XML data is a critical component of X...
Recently, access control on XML data has become an important research topic. Previous research on ac...
International audienceOver the past years several works have proposed access con- trol models for XM...