International audienceWe study the problem of querying virtual security views of XML data that has received a great attention during the past years. A major concern here is that user XPath queries posed on recursive views cannot be rewritten to be evaluated on the underlying XML data. Existing rewriting solutions are based on the non-standard language, “Regular XPath”, which makes rewriting possible under recursion. However, query rewriting under Regular XPath can be of exponential size. We show that query rewriting is always possible for arbitrary security views (recursive or not) by using only the expressive power of the standard XPath. We propose a more expressive language to specify XML access control policies as well as an efficient al...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
XML views have been widely used to enforce access control, support data integration, and speed up qu...
Rewriting and evaluating queries using views, also known as answering queries using views, is to uti...
International audienceWe study the problem of querying virtual security views of XML data that has r...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
International audienceIt is increasingly common to find XML views used to enforce access control as ...
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Since XML is used as a storage format in an increasing number of applications, security has become a...
International audienceIn this paper, we revisit the view based security framework for XML without im...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
XML views have been widely used to enforce access control, support data integration, and speed up qu...
Rewriting and evaluating queries using views, also known as answering queries using views, is to uti...
International audienceWe study the problem of querying virtual security views of XML data that has r...
International audienceMost state-of-the art approaches for securing XML documents allow users to acc...
We investigate the experimental effectiveness of XML security views. Our model consists of access co...
Abstract. We investigate the experimental effectiveness of query rewrit-ing over XML security views....
International audienceIt is increasingly common to find XML views used to enforce access control as ...
Abstract. In this paper, we revisit the view based security framework for XML without imposing any o...
We study the problem of answering queries posed on virtual views of XML documents, a problem commonl...
We introduce the notion of views as a mechanism for securing and providing access control in the con...
International audienceIn this paper, we revisit the view based security framework for XML without im...
Abstract. Since XML is used as a storage format in an increasing num-ber of applications, security h...
Since XML is used as a storage format in an increasing number of applications, security has become a...
International audienceIn this paper, we revisit the view based security framework for XML without im...
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [...
XML views have been widely used to enforce access control, support data integration, and speed up qu...
Rewriting and evaluating queries using views, also known as answering queries using views, is to uti...