A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
WordNet: a lexical database for English
Communications of the ACM
Extracting schema from semistructured data
SIGMOD '98 Proceedings of the 1998 ACM SIGMOD international conference on Management of data
WWW '99 Proceedings of the eighth international conference on World Wide Web
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
A Discovery-Based Approach to Database Ontology Design
Distributed and Parallel Databases
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
Using Schema Matching to Simplify Heterogeneous Data Translation
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Securing XML Documents with Author-X
IEEE Internet Computing
Making Agents Secure on the Semantic Web
IEEE Internet Computing
Mobile Code, Internet Security, and E-Commerce
ECOOP '00 Proceedings of the Workshops, Panels, and Posters on Object-Oriented Technology
A Secure Publishing Service for Digital Libraries of XML Documents
ISC '01 Proceedings of the 4th International Conference on Information Security
An Access Control Model for Tree Data Structures
ISC '02 Proceedings of the 5th International Conference on Information Security
Translating Access Authorizations for Transformed XML Documents
DEXA '02 Proceedings of the 13th International Conference on Database and Expert Systems Applications
Regulating access to SMIL formatted pay-per-view movies
Proceedings of the 2002 ACM workshop on XML security
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Self-manifestation of composite multimedia objects to satisfy security constraints
Proceedings of the 2003 ACM symposium on Applied computing
Design and implementation of a fine-grained menu control processor for web-based information systems
Future Generation Computer Systems - Selected papers on theoretical and computational aspects of structural dynamical systems in linear algebra and control
Information Systems - Special issue on web data integration
Derived access control specification for XML
Proceedings of the 2003 ACM workshop on XML security
RDF metadata for XML access control
Proceedings of the 2003 ACM workshop on XML security
A bitmap-based access control for restricted views of XML documents
Proceedings of the 2003 ACM workshop on XML security
Authorization Translation for XML Document Transformation
World Wide Web
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Databases, but not as we know them
ADC '04 Proceedings of the 15th Australasian database conference - Volume 27
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
An Authorization Model for Geospatial Data
IEEE Transactions on Dependable and Secure Computing
Relevancy based access control of versioned XML documents
Proceedings of the tenth ACM symposium on Access control models and technologies
Sanitizing using metadata in MetaXQuery
Proceedings of the 2005 ACM symposium on Applied computing
Authorization algorithms for the mobility of user-role relationship
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
A function-based access control model for XML databases
Proceedings of the 14th ACM international conference on Information and knowledge management
An access control model for querying XML data
Proceedings of the 2005 workshop on Secure web services
An authorization model for XML databases
SWS '04 Proceedings of the 2004 workshop on Secure web service
Ontology guided XML security engine
Journal of Intelligent Information Systems - Special issue: Database and applications security
Secure resource description framework: an access control model
Proceedings of the eleventh ACM symposium on Access control models and technologies
Model driven development of secure XML databases
ACM SIGMOD Record
Relevancy-based access control and its evaluation on versioned XML documents
ACM Transactions on Information and System Security (TISSEC)
Policy Administration Control and Delegation Using XACML and Delegent
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
The dynamic predicate: integrating access control with query processing in XML databases
The VLDB Journal — The International Journal on Very Large Data Bases
Optimizing the secure evaluation of twig queries
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
On the efficiency of secure XML broadcasting
Information Sciences: an International Journal
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Secure distribution and access of XML documents
International Journal of High Performance Computing and Networking
A geotemporal role-based authorisation system
International Journal of Information and Computer Security
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Adaptive Solutions for Access Control within Pervasive Healthcare Systems
ICOST '08 Proceedings of the 6th international conference on Smart Homes and Health Telematics
Access Control Labeling Scheme for Efficient Secure XML Query Processing
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
An Introduction to Authorization Conflict Problem in RDF Access Control
KES '08 Proceedings of the 12th international conference on Knowledge-Based Intelligent Information and Engineering Systems, Part II
Supporting Proscriptive Metadata in an XML DBMS
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Efficient Secure Labeling Method under Dynamic XML Data Streams
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
Access control system to XML databases: a framework
IMSA '07 Proceedings of the Eleventh IASTED International Conference on Internet and Multimedia Systems and Applications
Access control for XML documents and data
Information Security Tech. Report
XML secure views using semantic access control
Proceedings of the 2010 EDBT/ICDT Workshops
XML-BB: a model to handle relationships protection in XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Privacy-aware access control in XML databases
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Dynamic authorisation policies for event-based task delegation
CAiSE'10 Proceedings of the 22nd international conference on Advanced information systems engineering
Light-weight access control scheme for XML data
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part II
Efficient access control labeling scheme for secure XML query processing
Computer Standards & Interfaces
Journal of Computer and System Sciences
Towards secure XML document with usage control
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
Access control in geographic databases
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
Access authorization policy for XML document security
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A formal access control model for XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Extracting global policies for efficient access control of XML documents
WISE'05 Proceedings of the 6th international conference on Web Information Systems Engineering
Using schemas to simplify access control for XML documents
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
XML access control with policy matching tree
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Two phase filtering for XML access control
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Enforce mandatory access control policy on XML documents
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An efficient yet secure XML access control enforcement by safe and correct query modification
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Detecting information leakage in updating XML documents of fine-grained access control
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Efficient access control for secure XML query processing in data streams
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Protection of relationships in XML documents with the XML-BB model
ICISS'05 Proceedings of the First international conference on Information Systems Security
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
XML privacy protection model based on cloud storage
Computer Standards & Interfaces
A semantic authorization model for pervasive healthcare
Journal of Network and Computer Applications
Hi-index | 0.00 |
The Web is becoming the main information dissemination means in private and public organizations. As a consequence, several applications at both internet and intranet level need mechanisms to support a selective access to data available over the Web. In this context, developing an access control model, and related mechanisms, in terms of XML (eXtensible Markup Language) is an important step, because XML is increasingly used as the language for representing information exchanged over the Web. In this paper, we propose access control policies and an associated model for XML documents, addressing peculiar protection requirements posed by XML. A first requirement is that varying protection granularity levels should be supported to guarantee a differentiated protection of document contents. A second requirement arises from the fact that XML documents do not always conform to a predefined document type. To cope with these requirements, the proposed model supports varying protection granularity levels, ranging from a set of documents, to a single document or specific document portion(s). Moreover, it allows the Security Administrator to choose different policies for documents not covered or only partially covered by the existing access control policies for document types. An access control mechanism for the enforcement of the proposed model is finally described.