In this thesis, we make two major contributions that help the tasks of querying, updating, and managing XML data become quick and safe. First, we propose a new labelling scheme for dynamic XML data that supports the representation of the ancestor – descendant relationship and sibling relationship between nodes. Our unique way of labelling codes can also help users easily determine the depth (level) of the XML tree. Moreover, it also supports the process of updating XML data without the need of re-labelling existing labels, hence facilitating fast update. Some experimental works have been conducted to show its effectiveness. Secondly, for XML security purposes, we propose a fine-grained access control model, named SecureX, which supports ...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
As XML continues to be utilised in various fields of information technology, an urgent need for mana...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
As XML is emerging as a de facto standard for sharing and exchanging data over the internet, access ...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
By specifying a fine-grained access control on the XML data, an accessibility map is required to det...
By specifying a fine-grained access control on the XML data, an accessibility map is required to det...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
In the last few years, an increasing amount of si-structured data have become available electronical...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...
In this thesis, we make two major contributions that help the tasks of querying, updating, and manag...
As XML continues to be utilised in various fields of information technology, an urgent need for mana...
Many existing access controls use node filtering or\ud querying rewriting techniques. These techniqu...
As XML is emerging as a de facto standard for sharing and exchanging data over the internet, access ...
Fine-grained access controls for XML define access privileges at the granularity of individual XML n...
By specifying a fine-grained access control on the XML data, an accessibility map is required to det...
By specifying a fine-grained access control on the XML data, an accessibility map is required to det...
Abstract. A practical mandatory access control (MAC) model for XML databases is presented in this pa...
Abstract: Access control is an important aspect in guaranteeing data privacy within XML data sources...
In the last few years, an increasing amount of si-structured data have become available electronical...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
A practical mandatory access control (MAC) model for XML databases is presented in this paper. The ...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
Le langage XML est devenu un standard de représentation et d'échange de données à travers le web. Le...
XML has become a crucial tool for data storage and exchange. In this chapter, after a brief introduc...