Efficient management of transitive relationships in large data and knowledge bases
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Finding Regular Simple Paths in Graph Databases
SIAM Journal on Computing
Active object: an object behavioral pattern for concurrent programming
Pattern languages of program design 2
Pattern-oriented software architecture: a system of patterns
Pattern-oriented software architecture: a system of patterns
CORBA design patterns
The platform for privacy preferences
Communications of the ACM
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Path constraints in semistructured databases
Journal of Computer and System Sciences - Special issue on the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems
Role-based access control on the web
ACM Transactions on Information and System Security (TISSEC)
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Flexible authentication of XML documents
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Concurrent Programming in Java: Design Principles and Patterns
Concurrent Programming in Java: Design Principles and Patterns
Database Systems Concepts
Securing XML Documents with Author-X
IEEE Internet Computing
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
Active Views for Electronic Commerce
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Complex Subjects, or: The Striving for Complexity is Ruling our World
Proceedings of the IFIP WG11.3 Working Conference on Database Security VII
ECOOP '01 Proceedings of the 15th European Conference on Object-Oriented Programming
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
XML-Based Distributed Access Control System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
Secure Content Distribution for Digital Libraries
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
Access Control Infrastructure for Digital Objects
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Towards securing XML Web services
Proceedings of the 2002 ACM workshop on XML security
Integrating PMI services in CORBA applications
Computer Standards & Interfaces - CORBA: protocols, applications, process models and standards
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Security for XML messaging services: a component-based approach
Journal of Network and Computer Applications
Design and implementation of a fine-grained menu control processor for web-based information systems
Future Generation Computer Systems - Selected papers on theoretical and computational aspects of structural dynamical systems in linear algebra and control
Derived access control specification for XML
Proceedings of the 2003 ACM workshop on XML security
An access control framework for business processes for web services
Proceedings of the 2003 ACM workshop on XML security
A bitmap-based access control for restricted views of XML documents
Proceedings of the 2003 ACM workshop on XML security
An XML-based approach to combine firewalls and web services security specifications
Proceedings of the 2003 ACM workshop on XML security
Concept-level access control for the Semantic Web
Proceedings of the 2003 ACM workshop on XML security
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Secure XML querying with security views
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Static analysis of role-based access control in J2EE applications
ACM SIGSOFT Software Engineering Notes
Privacy protecting data collection in media spaces
Proceedings of the 12th annual ACM international conference on Multimedia
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Proceedings of the tenth ACM symposium on Access control models and technologies
Generalized XML security views
Proceedings of the tenth ACM symposium on Access control models and technologies
Relevancy based access control of versioned XML documents
Proceedings of the tenth ACM symposium on Access control models and technologies
Provable bounds for portable and flexible privacy-preserving access
Proceedings of the tenth ACM symposium on Access control models and technologies
Security analysis of cryptographically controlled access to XML documents
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Safe data sharing and data dissemination on smart devices
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
Sanitizing using metadata in MetaXQuery
Proceedings of the 2005 ACM symposium on Applied computing
Integration and Efficient Lookup of Compressed XML Accessibility Maps
IEEE Transactions on Knowledge and Data Engineering
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
A function-based access control model for XML databases
Proceedings of the 14th ACM international conference on Information and knowledge management
Web services enterprise security architecture: a case study
Proceedings of the 2005 workshop on Secure web services
Policy-based dissemination of partial web-ontologies
Proceedings of the 2005 workshop on Secure web services
An authorization model for XML databases
SWS '04 Proceedings of the 2004 workshop on Secure web service
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Creating non-decomposable stream bundles in multimedia web services using uSMIL
SWS '04 Proceedings of the 2004 workshop on Secure web service
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Presto Authorization: A Bitmap Indexing Scheme for High-Speed Access Control to XML Documents
IEEE Transactions on Knowledge and Data Engineering
Role-Based access control consistency validation
Proceedings of the 2006 international symposium on Software testing and analysis
Succinct representation of flexible and privacy-preserving access rights
The VLDB Journal — The International Journal on Very Large Data Bases
Multimedia-based authorization and access control policy specification
Proceedings of the 3rd ACM workshop on Secure web services
Theoretical Computer Science - Applied semantics: Selected topics
Relevancy-based access control and its evaluation on versioned XML documents
ACM Transactions on Information and System Security (TISSEC)
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
History-based access control for XML documents
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
When Role Models Have Flaws: Static Validation of Enterprise Security Policies
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
The dynamic predicate: integrating access control with query processing in XML databases
The VLDB Journal — The International Journal on Very Large Data Bases
Distributed access control: a privacy-conscious approach
Proceedings of the 12th ACM symposium on Access control models and technologies
Formalizing XML access control for update operations
Proceedings of the 12th ACM symposium on Access control models and technologies
Secure Information Sharing in a Virtual Multi-Agency Team Environment
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
On the efficiency of secure XML broadcasting
Information Sciences: an International Journal
Automaton segmentation: a new approach to preserve privacy in xml information brokering
Proceedings of the 14th ACM conference on Computer and communications security
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
SIGMCC: A system for sharing meta patient records in a Peer-to-Peer environment
Future Generation Computer Systems
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An electronic patient record "on steroids": distributed, peer-to-peer, secure and privacy-conscious
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
ACCOn: checking consistency of XML write-access control policies
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Proceedings of the 2nd international conference on Scalable information systems
A flexible mandatory access control policy for XML databases
Proceedings of the 2nd international conference on Scalable information systems
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
A general approach to securely querying XML
Computer Standards & Interfaces
Semantic query Cache using Dynamic Facts (SCDF): a novel approach to efficient information retrieval
International Journal of Metadata, Semantics and Ontologies
Access Control for XML Document
IEA/AIE '08 Proceedings of the 21st international conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems: New Frontiers in Applied Artificial Intelligence
Access Control Labeling Scheme for Efficient Secure XML Query Processing
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
A Secure Mediator for Integrating Multiple Level Access Control Policies
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
An Introduction to Authorization Conflict Problem in RDF Access Control
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Beyond User-to-User Access Control for Online Social Networks
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Efficient Secure Labeling Method under Dynamic XML Data Streams
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
A practical mandatory access control model for XML databases
Information Sciences: an International Journal
CSchema: a downgrading policy language for XML access control
Journal of Computer Science and Technology
A semantic cache framework for secure XML queries
Journal of Computer Science and Technology
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
ISC '09 Proceedings of the 12th International Conference on Information Security
Controlling Access to XML Documents over XML Native and Relational Databases
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Artificial Intelligence in Medicine
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
Access control system to XML databases: a framework
IMSA '07 Proceedings of the Eleventh IASTED International Conference on Internet and Multimedia Systems and Applications
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
Access control for XML documents and data
Information Security Tech. Report
Semantics-aware security policy specification for the semantic web data
International Journal of Information and Computer Security
XML repository searcher-browser supporting fine-grained access control
International Journal of Computers and Applications
ClientBased access control evaluator for XML databases
CIT'09 Proceedings of the 3rd International Conference on Communications and information technology
Security issues for the use of semantic web in e-commerce
BIS'07 Proceedings of the 10th international conference on Business information systems
Static verification of access control model for AXML documents
APWeb/WAIM'07 Proceedings of the joint 9th Asia-Pacific web and 8th international conference on web-age information management conference on Advances in data and web management
On flexible modeling of history-based access control policies for XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
XML-BB: a model to handle relationships protection in XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Fine-grained sticky provenance architecture for office documents
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
A unified conflict resolution algorithm
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
WISE'07 Proceedings of the 2007 international conference on Web information systems engineering
Management advantages of object classification in role-based access control (RBAC)
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Repairing inconsistent XML write-access control policies
DBPL'07 Proceedings of the 11th international conference on Database programming languages
Protecting individual information against inference attacks in data publishing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Security-conscious XML indexing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
A system architecture for history-based access control for XML documents
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
Differential access for publicly-posted composite documents with multiple workflow participants
Proceedings of the 10th ACM symposium on Document engineering
APEX: automated policy enforcement eXchange
Proceedings of the 10th ACM symposium on Document engineering
Privacy-aware access control in XML databases
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
SecTag: a multi-policy supported secure web tag framework
Proceedings of the 17th ACM conference on Computer and communications security
A labelling system for derived data control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
fQuery: SPARQL query rewriting to enforce data confidentiality
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Light-weight access control scheme for XML data
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II
An authorization framework resilient to policy evaluation failures
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Privacy preserving event driven integration for interoperating social and health systems
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Proceedings of the 14th International Conference on Database Theory
A formal language for specifying complex XML authorisations with temporal constraints
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hecate, managing authorization with RESTful XML
Proceedings of the Second International Workshop on RESTful Design
Unifying private registry and web service access control
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
Efficient access control labeling scheme for secure XML query processing
Computer Standards & Interfaces
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Role-based access to facilities lifecycle information on RFID tags
Advanced Engineering Informatics
An efficient access control model for schema-based relational storage of XML documents
Proceedings of the 49th Annual Southeast Regional Conference
Journal of Computer and System Sciences
ACM Transactions on Information and System Security (TISSEC)
An extended mandatory access control model for XML
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Policy classes and query rewriting algorithm for XML security views
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Extracting global policies for efficient access control of XML documents
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
XFlat: query friendly encrypted XML view publishing
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A model of XML access control with dual-level security views
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
XML-Based declarative access control
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Enforcing semantics-aware security in multimedia surveillance
Journal on Data Semantics II
Secure model management operations for the web
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Using schemas to simplify access control for XML documents
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
XML access control with policy matching tree
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Two phase filtering for XML access control
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Hybrid authorizations and conflict resolution
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Enforce mandatory access control policy on XML documents
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An efficient yet secure XML access control enforcement by safe and correct query modification
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Detecting information leakage in updating XML documents of fine-grained access control
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
An approach for XML inference control based on RDF
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Efficient access control for secure XML query processing in data streams
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Protection of relationships in XML documents with the XML-BB model
ICISS'05 Proceedings of the First international conference on Information Systems Security
Two-Stage access control model for XML security
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
A novel labeling scheme for secure broadcasting of XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
A semantic approach for access control in web services
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
PTaCL: a language for attribute-based access control in open systems
POST'12 Proceedings of the First international conference on Principles of Security and Trust
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
Secure XML querying based on authorization graphs
Information Systems Frontiers
A framework for the modular specification and orchestration of authorization policies
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Storing XML rules in relational storage of XML DTD
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
Content-based information protection and release in NATO operations
Proceedings of the 18th ACM symposium on Access control models and technologies
Relational abstract interpretation for the verification of 2-hypersafety properties
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
A semantic authorization model for pervasive healthcare
Journal of Network and Computer Applications
Hi-index | 0.00 |
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing of information via the Web that must be accessed in a selective way, such as electronic commerce transactions, require the definition and enforcement of security controls, ensuring that information will be accessible only to authorized entities. Different approaches have been proposed that address the problem of protecting information in a Web system. However, these approaches typically operate at the file-system level, independently of the data that have to be protected from unauthorized accesses. Part of this problem is due to the limitations of HTML, historically used to design Web documents. The extensible markup language (XML), a markup language promoted by the World Wide Web Consortium (W3C), is de facto the standard language for the exchange of information on the Internet and represents an important opportunity to provide fine-grained access control. We present an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents. We present a language for the specification of access restrictions, which uses standard notations and concepts, together with a description of a system architecture for access control enforcement based on existing technology. The result is a flexible and powerful security system offering a simple integration with current solutions.