Database security
Query rewriting for semistructured data
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Data on the Web: from relations to semistructured data and XML
Data on the Web: from relations to semistructured data and XML
Minimization of tree pattern queries
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Communication and Concurrency
Containment and equivalence for an XPath fragment
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Efficient algorithms for minimizing tree pattern queries
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
SilkRoute: A framework for publishing relational data in XML
ACM Transactions on Database Systems (TODS)
Optimizing Regular Path Expressions Using Graph Schemas
ICDE '98 Proceedings of the Fourteenth International Conference on Data Engineering
Reformulation of XML Queries and Constraints
ICDT '03 Proceedings of the 9th International Conference on Database Theory
A Theoretical Framework of Hybrid Approaches to MAX SAT
ISAAC '97 Proceedings of the 8th International Symposium on Algorithms and Computation
XPath Containment in the Presence of Disjunction, DTDs, and Variables
ICDT '03 Proceedings of the 9th International Conference on Database Theory
Physical Data Independence, Constraints, and Optimization with Universal Plans
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
Sub-document queries over XML with XSQirrel
WWW '05 Proceedings of the 14th international conference on World Wide Web
AC-XML documents: improving the performance of a web access control module
Proceedings of the tenth ACM symposium on Access control models and technologies
Generalized XML security views
Proceedings of the tenth ACM symposium on Access control models and technologies
XPath satisfiability in the presence of DTDs
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Integration and Efficient Lookup of Compressed XML Accessibility Maps
IEEE Transactions on Knowledge and Data Engineering
The case for access control on XML relationships
Proceedings of the 14th ACM international conference on Information and knowledge management
Access control for XML: a dynamic query rewriting approach
Proceedings of the 14th ACM international conference on Information and knowledge management
IPAC: an interactive approach to access control for semi-structured data
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
SMOQE: a system for providing secure access to XML
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Comparing XML path expressions
Proceedings of the 2006 ACM symposium on Document engineering
XML access control using static analysis
ACM Transactions on Information and System Security (TISSEC)
A system for the static analysis of XPath
ACM Transactions on Information Systems (TOIS)
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
Incremental adaptation of XPath access control views
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Querying xml with update syntax
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Efficient static analysis of XML paths and types
Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation
The dynamic predicate: integrating access control with query processing in XML databases
The VLDB Journal — The International Journal on Very Large Data Bases
Distributed access control: a privacy-conscious approach
Proceedings of the 12th ACM symposium on Access control models and technologies
Formalizing XML access control for update operations
Proceedings of the 12th ACM symposium on Access control models and technologies
Deciding XPath containment with MSO
Data & Knowledge Engineering
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security (TISSEC)
Exporting and interactively querying Web service-accessed sources: The CLIDE System
ACM Transactions on Database Systems (TODS)
On the efficiency of secure XML broadcasting
Information Sciences: an International Journal
XFlat: Query-friendly encrypted XML view publishing
Information Sciences: an International Journal
Secure XML publishing without information leakage in the presence of data inference
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Taming XPath queries by minimizing wildcard steps
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Filtering unsatisfiable XPath queries
Data & Knowledge Engineering
XPath satisfiability in the presence of DTDs
Journal of the ACM (JACM)
ACCOn: checking consistency of XML write-access control policies
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Proceedings of the 2nd international conference on Scalable information systems
An integrated access control for securely querying and updating XML data
ADC '08 Proceedings of the nineteenth conference on Australasian database - Volume 75
A general approach to securely querying XML
Computer Standards & Interfaces
Access Control Model Based on RDB Security Policy for OWL Ontology
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
ACM Computing Surveys (CSUR)
Reasoning about XML with Temporal Logics and Automata
LPAR '08 Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
A practical mandatory access control model for XML databases
Information Sciences: an International Journal
CSchema: a downgrading policy language for XML access control
Journal of Computer Science and Technology
A semantic cache framework for secure XML queries
Journal of Computer Science and Technology
Query translation from XPath to SQL in the presence of recursive DTDs
The VLDB Journal — The International Journal on Very Large Data Bases
DBPL '09 Proceedings of the 12th International Symposium on Database Programming Languages
Controlling Access to XML Documents over XML Native and Relational Databases
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Precomputing queries for personal health sensor environments
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Efficient rewriting of XPath queries using Query Set Specifications
Proceedings of the VLDB Endowment
XML repository searcher-browser supporting fine-grained access control
International Journal of Computers and Applications
Security issues for the use of semantic web in e-commerce
BIS'07 Proceedings of the 10th international conference on Business information systems
A rewrite based approach for enforcing access constraints for XML
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Query and update through XML views
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Hasslefree: simplified access control management for XML documents
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Repairing inconsistent XML write-access control policies
DBPL'07 Proceedings of the 11th international conference on Database programming languages
Verification of the security against inference attacks on XML databases
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Rewrite-based verification of XML updates
Proceedings of the 12th international ACM SIGPLAN symposium on Principles and practice of declarative programming
Privacy-aware access control in XML databases
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Optimizing XML data with view fragments
ADC '10 Proceedings of the Twenty-First Australasian Conference on Database Technologies - Volume 104
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
Distributed and secure access control in P2P databases
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Consistent query answers from virtually integrated XML data
Journal of Systems and Software
Updating XML views and querying XML views with update syntax
International Journal of Computational Science and Engineering
Inheriting access control rules from large relational databases to materialized views automatically
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
Querying XML data sources that export very large sets of views
ACM Transactions on Database Systems (TODS)
Proceedings of the 14th International Conference on Database Theory
A formal language for specifying complex XML authorisations with temporal constraints
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Rewriting queries on SPARQL views
Proceedings of the 20th international conference on World wide web
Hecate, managing authorization with RESTful XML
Proceedings of the Second International Workshop on RESTful Design
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Policy classes and query rewriting algorithm for XML security views
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Satisfiability of XPath queries with sibling axes
DBPL'05 Proceedings of the 10th international conference on Database Programming Languages
Detecting privacy violations in sensitive XML databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part IV
XFlat: query friendly encrypted XML view publishing
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
A model of XML access control with dual-level security views
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
Authorization-Transparent access control for XML under the non-truman model
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
XML-Based declarative access control
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
An efficient approach to support querying secure outsourced XML information
CAiSE'06 Proceedings of the 18th international conference on Advanced Information Systems Engineering
Information disclosure by XPath queries
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Enforce mandatory access control policy on XML documents
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
An approach for XML inference control based on RDF
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
ADBIS'06 Proceedings of the 10th East European conference on Advances in Databases and Information Systems
Query translation for XPath-based security views
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Protection of relationships in XML documents with the XML-BB model
ICISS'05 Proceedings of the First international conference on Information Systems Security
Secure querying of recursive XML views: a standard xpath-based technique
Proceedings of the 21st international conference companion on World Wide Web
Access control for RDF graphs using abstract models
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Secure XML querying based on authorization graphs
Information Systems Frontiers
Labeling workflow views with fine-grained dependencies
Proceedings of the VLDB Endowment
Decidability of Downward XPath
ACM Transactions on Computational Logic (TOCL)
Storing XML rules in relational storage of XML DTD
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Consistency and repair for XML write-access control policies
The VLDB Journal — The International Journal on Very Large Data Bases
FENCE: continuous access control enforcement in dynamic data stream environments
Proceedings of the third ACM conference on Data and application security and privacy
HyXAC: a hybrid approach for XML access control
Proceedings of the 18th ACM symposium on Access control models and technologies
On XPath with transitive axes and data tests
Proceedings of the 32nd symposium on Principles of database systems
On securely manipulating XML data
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
SVMAX: a system for secure and valid manipulation of XML data
Proceedings of the 17th International Database Engineering & Applications Symposium
A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard
Computer Methods and Programs in Biomedicine
Hi-index | 0.00 |
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive information unauthorized users. This paper introduces a novel paradigm for specifying XML security constraints and investigates the enforcement of such constraints during XML query evaluation. Our approach is based on the novel concept of security views, which provide for each user group (a) an XML view consisting of all and only the information that the users are authorized to access, and (b) a view DTD that the XML view conforms to. Security views effectively protect sensitive data from access and potential inferences by unauthorized user, and provide authorized users with necessary schema information to facilitate effective query formulation and optimization. We propose an efficient algorithm for deriving security view definitions from security policies (defined on the original document DTD) for different user groups. We also develop novel algorithms for XPath query rewriting and optimization such that queries over security views can be efficiently answered without materializing the views. Our algorithms transform a query over a security view to an equivalent query over the original document, and effectively prune query nodes by exploiting the structural properties of the document DTD in conjunction with approximate XPath containment tests. Our work is the first to study a flexible, DTD-based access-control model for XML and its implications on the XML query-execution engine. Furthermore, it is among the first efforts for query rewriting and optimization in the presence of general DTDs for a rich a class of XPath queries. An empirical study based on real-life DTDs verifies the effectiveness of our approach.