Journal of the ACM (JACM)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Containment and equivalence for an XPath fragment
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
The inference problem: a survey
ACM SIGKDD Explorations Newsletter
Content extraction signatures using XML digital signatures and custom transforms on-demand
WWW '03 Proceedings of the 12th international conference on World Wide Web
An infrastructure for managing secure update operations on XML data
Proceedings of the eighth ACM symposium on Access control models and technologies
Partial outsourcing: a new paradigm for access control
Proceedings of the eighth ACM symposium on Access control models and technologies
Cryptographic access control in a distributed file system
Proceedings of the eighth ACM symposium on Access control models and technologies
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Balancing confidentiality and efficiency in untrusted relational DBMSs
Proceedings of the 10th ACM conference on Computer and communications security
Specifying access control policies for XML documents with XPath
Proceedings of the ninth ACM symposium on Access control models and technologies
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Secure XML querying with security views
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
An Update Protocol for XML Documents in Distributed and Cooperative Systems
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
An access control model for querying XML data
Proceedings of the 2005 workshop on Secure web services
Digital Signatures for Modifiable Collections
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Query Rewriting for Access Control on Semantic Web
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
A trusted decentralized access control framework for the client/server architecture
Journal of Network and Computer Applications
Access Control on Semantic Web Data Using Query Rewriting
International Journal of Organizational and Collective Intelligence
Hi-index | 0.00 |
With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like access control and data privacy are becoming increasingly complex and difficult to manage. Very often, when dealing with sensitive information in such settings, the specification of access control policies and their enforcement are no longer handled by the actual data sources, and are (partially) delegated to third-parties. Besides practical reasons, this is the case when decisions regarding access depend on factors which overpass the scope and knowledge of some of the entities involved. More specifically, policies may depend on private aspects concerning users (accessing data) or data owners. In this case, the only solution is to entrust some third-party authority with all the information needed to apply access policies. However, as the policies themselves depend on sensitive information, this outsourcing raises new privacy issues, that were not present in centralized environments. In particular, information leaks may occur during access control enforcement. In this paper, we consider these issues and, starting from non-conventional digital signatures, we take a first step towards an implementation solution for such settings where both data and access policies are distributed. Our approach involves rewriting user queries into forms which are authorized, and we illustrate this for both structured (relational) and semi-structured (XML) data and queries.