Secure Query-Processing Strategies
Computer
Path constraints on semistructured and structured data
PODS '98 Proceedings of the seventeenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
Proceedings of the 10th international conference on World Wide Web
Constraints for semistructured data and XML
ACM SIGMOD Record
On XML integrity constraints in the presence of DTDs
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Securing XML Documents with Author-X
IEEE Internet Computing
XML Access Control Systems: A Component-Based Approach
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Regulating Access To Semistructured Information on the Web
Proceedings of the IFIP TC11 Fifteenth Annual Working Conference on Information Security for Global Information Infrastructures
Author-X: A Java-Based System for XML Data Protection
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Towards Access Control for Logical Document Structures
DEXA '98 Proceedings of the 9th International Workshop on Database and Expert Systems Applications
Policy Definition Language for Automated Management of Distributed Systems
SMW '96 Proceedings of the 2nd IEEE International Workshop on Systems Management (SMW'96)
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Relevancy based access control of versioned XML documents
Proceedings of the tenth ACM symposium on Access control models and technologies
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
Journal of Cognitive Neuroscience
Relevancy-based access control and its evaluation on versioned XML documents
ACM Transactions on Information and System Security (TISSEC)
Formalizing XML access control for update operations
Proceedings of the 12th ACM symposium on Access control models and technologies
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
An approach for XML inference control based on RDF
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Hi-index | 0.00 |
In this paper we present an access control framework that provides flexible security granularity for XML documents. RDF statements are used to represent security objects and to express security policy. The concepts of simple security object and association security object are defined. Our model allows to express and enforce access control on XML trees and their associations. Access control rules, corresponding to (s, o, ±a) triples, are represented as RDF statements with properties access type, user, and object. A history file is maintained for each user that allows decision-making using temporal data.