Secure agreement protocols: reliable and atomic group multicast in rampart
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A Secure Group Membership Protocol
IEEE Transactions on Software Engineering
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
On specifying security policies for web documents with an XML-based language
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Information and Computation
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Consistently updating XML documents using incremental constraint check queries
Proceedings of the 4th international workshop on Web information and data management
On Diffusing Updates in a Byzantine Environment
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Access control of XML documents considering update operations
Proceedings of the 2003 ACM workshop on XML security
An Update Protocol for XML Documents in Distributed and Cooperative Systems
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
The Challenge of Assuring Data Trustworthiness
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
Agent system for managing distributed mobile interactive documents
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II
Assuring data trustworthiness: concepts and research challenges
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Agent system for managing distributed mobile interactive documents in knowledge-based organizations
Transactions on Compuational Collective Intelligence VI
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Hi-index | 0.01 |
This paper proposes an infrastructure and related algorithms for the controlled and cooperative updates of XML documents. Key components of the proposed system are a set of XML-based languages for specifying access-control policies and the path that the document must follow during its update. Such path can be fully specified before the update process begins or can be dynamically modified by properly authorized subjects while being transmitted. Our approach is fully distributed in that each party involved in the process can verify the correctness of the operations performed until that point on the document without relying on a central authority. More importantly, the recovery procedure also does not need the participation of a central authority. Our approach is based on the use of some special control information that is transmitted together with the document and a suite of protocols. We formally specify the structure of such control information and the protocols. We also analyze security and complexity of the proposed protocols.