WordNet: a lexical database for English
Communications of the ACM
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Securing XML documents: the author-X project demonstration
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Network Security Essentials: Applications and Standards
Network Security Essentials: Applications and Standards
A Discovery-Based Approach to Database Ontology Design
Distributed and Parallel Databases
Tutorial 4: Directories: Managing Data for Networked Applications
ICDE '00 Proceedings of the 16th International Conference on Data Engineering
Safeguarding Digital Library Contents and Users: Assuring ConvenientSecurity and Data Quality
Safeguarding Digital Library Contents and Users: Assuring ConvenientSecurity and Data Quality
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
Protection and administration of XML data sources
Data & Knowledge Engineering - Data and applications security
Controlling Access to XML Documents
IEEE Internet Computing
Secure Content Distribution for Digital Libraries
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
Access Control Infrastructure for Digital Objects
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Regulating access to SMIL formatted pay-per-view movies
Proceedings of the 2002 ACM workshop on XML security
Integrating PMI services in CORBA applications
Computer Standards & Interfaces - CORBA: protocols, applications, process models and standards
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Design and implementation of a fine-grained menu control processor for web-based information systems
Future Generation Computer Systems - Selected papers on theoretical and computational aspects of structural dynamical systems in linear algebra and control
RDF metadata for XML access control
Proceedings of the 2003 ACM workshop on XML security
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
Access-Control Language for Multidomain Environments
IEEE Internet Computing
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
AC-XML documents: improving the performance of a web access control module
Proceedings of the tenth ACM symposium on Access control models and technologies
Provable bounds for portable and flexible privacy-preserving access
Proceedings of the tenth ACM symposium on Access control models and technologies
Security analysis of cryptographically controlled access to XML documents
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
ACM Transactions on Information and System Security (TISSEC)
Safe data sharing and data dissemination on smart devices
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Mediation security specification and enforcement for heterogeneous databases
Proceedings of the 2005 ACM symposium on Applied computing
A Trust-Based Context-Aware Access Control Model for Web-Services
Distributed and Parallel Databases
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Applying hierarchical and role-based access control to XML documents
SWS '04 Proceedings of the 2004 workshop on Secure web service
Meta-data indexing for XPath location steps
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Succinct representation of flexible and privacy-preserving access rights
The VLDB Journal — The International Journal on Very Large Data Bases
Multimedia-based authorization and access control policy specification
Proceedings of the 3rd ACM workshop on Secure web services
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
Optimizing the secure evaluation of twig queries
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
On the efficiency of secure XML broadcasting
Information Sciences: an International Journal
Controlling access to published data using cryptography
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
Client-based access control management for XML documents
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Security analysis of cryptographically controlled access to XML documents
Journal of the ACM (JACM)
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Secure distribution and access of XML documents
International Journal of High Performance Computing and Networking
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
Access Control Model Based on RDB Security Policy for OWL Ontology
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
Privacy preserving document indexing infrastructure for a distributed environment
Proceedings of the VLDB Endowment
Zerber+R: top-k retrieval from a confidential index
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Enforcing role based access control model with multimedia signatures
Journal of Systems Architecture: the EUROMICRO Journal
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
Automatic transformations between geoscience standards using XML
Computers & Geosciences
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
Access control for XML documents and data
Information Security Tech. Report
XML repository searcher-browser supporting fine-grained access control
International Journal of Computers and Applications
Towards mobile process as a service
Proceedings of the 2010 ACM Symposium on Applied Computing
Hasslefree: simplified access control management for XML documents
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
A labelling system for derived data control
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
An authorization framework resilient to policy evaluation failures
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Towards runtime migration of WS-BPEL processes
ICSOC/ServiceWave'09 Proceedings of the 2009 international conference on Service-oriented computing
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Unifying private registry and web service access control
MIV'05 Proceedings of the 5th WSEAS international conference on Multimedia, internet & video technologies
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
ACM Transactions on Information and System Security (TISSEC)
Credential-Based policies management in an access control framework protecting XML resources
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
XFlat: query friendly encrypted XML view publishing
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
XML-Based declarative access control
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Web service engineering – advancing a new software engineering discipline
ICWE'05 Proceedings of the 5th international conference on Web Engineering
Web data protection: principles and research issues
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Using schemas to simplify access control for XML documents
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Semantic access control model: a formal specification
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Two phase filtering for XML access control
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Enforce mandatory access control policy on XML documents
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An efficient yet secure XML access control enforcement by safe and correct query modification
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Efficient access control for secure XML query processing in data streams
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Model driven security for inter-organizational workflows in e-government
TCGOV'05 Proceedings of the 2005 international conference on E-Government: towards Electronic Democracy
A semantic approach for access control in web services
EuroWeb'02 Proceedings of the 2002 international conference on EuroWeb
PTaCL: a language for attribute-based access control in open systems
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Secure XML querying based on authorization graphs
Information Systems Frontiers
A framework for the modular specification and orchestration of authorization policies
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Behavioral Attestation for Web Services Based Business Processes
International Journal of Web Services Research
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
Author-X is a Java-based system that addresses the security issues of access control and policy design for XML document administration. Author-X supports the specification of policies at varying granularity levels and the specification of user credentials as a way to enforce access control. Access control is available according to both push and pull document distribution policies, and document updates are distributed through a combination of hash functions and digital signature techniques. The Author-X approach to distributed updates allows a user to verify a document's integrity without contacting the document server