Understanding the new SQL: a complete guide
Understanding the new SQL: a complete guide
ACM Transactions on Database Systems (TODS)
The difficulty of optimum index selection
ACM Transactions on Database Systems (TODS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
SilkRoute: A framework for publishing relational data in XML
ACM Transactions on Database Systems (TODS)
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
Securing XML Documents with Author-X
IEEE Internet Computing
A Formal Perspective on the View Selection Problem
Proceedings of the 27th International Conference on Very Large Data Bases
Efficiently publishing relational data as XML documents
The VLDB Journal — The International Journal on Very Large Data Bases
Role-Based Access Control
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Expressiveness and complexity of xml publishing transducers
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
DTD-directed publishing with attribute translation grammars
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
Xml publishing: bridging theory and practice
DBPL'07 Proceedings of the 11th international conference on Database programming languages
Hi-index | 0.00 |
Controlling access to data is of paramount importance to many database applications. In data integration and data interchange scenarios, relational data is published as XML, and it is natural to require that all existing access control policies defined over the relational data be completely -- and verifiably -- preserved over the XML representation. While many XML-specific access control models have been proposed, there currently is no automated method for converting an SQL access control policy to an equivalent policy in one of these models. Instead, the database administrator must carry out such translations manually, a tedious and error-prone process which can easily lead to the unintentional granting of user access to restricted data. This work seeks to develop such an automated solution, and to examine various related issues such as optimization and verification of generated XML access control policies.