Database security
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
Securing XML documents: the author-X project demonstration
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
A Discovery-Based Approach to Database Ontology Design
Distributed and Parallel Databases
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Protection and administration of XML data sources
Data & Knowledge Engineering - Data and applications security
Securing XML Documents with Author-X
IEEE Internet Computing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Access Control Infrastructure for Digital Objects
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
An infrastructure for managing secure update operations on XML data
Proceedings of the eighth ACM symposium on Access control models and technologies
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Model-Driven Trust Negotiation for Web Services
IEEE Internet Computing
Provable bounds for portable and flexible privacy-preserving access
Proceedings of the tenth ACM symposium on Access control models and technologies
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Succinct representation of flexible and privacy-preserving access rights
The VLDB Journal — The International Journal on Very Large Data Bases
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
ACM Transactions on Information and System Security (TISSEC)
Intensional associations between data and metadata
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
Secure distribution and access of XML documents
International Journal of High Performance Computing and Networking
Access Control Model Based on RDB Security Policy for OWL Ontology
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
An Adaptive Policy-Based Approach to SPIT Management
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Information disclosure by answers to XPath queries
Journal of Computer Security - Selected papers from the Third and Fourth Secure Data Management (SDM) workshops
Efficient integration of fine-grained access control and resource brokering in grid
The Journal of Supercomputing
The practical application of a process for eliciting and designing security in web service systems
Information and Software Technology
Automatic transformations between geoscience standards using XML
Computers & Geosciences
Modeling Associations through Intensional Attributes
ER '09 Proceedings of the 28th International Conference on Conceptual Modeling
Access control for XML documents and data
Information Security Tech. Report
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
An extended mandatory access control model for XML
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Defining and measuring policy coverage in testing access control policies
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Detecting privacy violations in sensitive XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Web data protection: principles and research issues
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Using schemas to simplify access control for XML documents
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Hi-index | 0.01 |
The rapid growth of the Web and the ease with which data can be accessed facilitate the distribution and sharing of information. Information dissemination often takes the form of documents that are made available at Web servers, or that are actively broadcasted by Web servers to interested clients. In this paper, we present an XML-compliant formalism for specifying security-related information for Web document protection. In particular, we introduceX-Sec, an XML-based language for specifying subject credentials and security policies and for organizing them into subject profiles and policy bases, respectively. The language is complemented by a set of subscription-based schemes for accessing distributed Web documents, which rely on defined XML subject profiles and XML policy bases.