Access the full text.
Sign up today, get DeepDyve free for 14 days.
Yan Xiao, Bo Luo, Dongwon Lee (2007)
Security-Conscious XML Indexing
SungRan Cho, S. Amer-Yahia, L. Lakshmanan, D. Srivastava (2002)
Optimizing the Secure Evaluation of Twig Queries
E. Damiani, Majirus Fansi, A. Gabillon, S. Marrara (2008)
A general approach to securely querying XMLComput. Stand. Interfaces, 30
Padmapriya Ayyagari, P. Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee (2007)
Incremental adaptation of XPath access control views
Jae-Gil Lee, K. Whang, Wook-Shin Han, I. Song (2007)
The dynamic predicate: integrating access control with query processing in XML databasesThe VLDB Journal, 16
Gunjan Samtani (2002)
Extensible Markup Language (XML)
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu (2004)
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
A. Gabillon (2004)
An authorization model for XML databases
H. Zhang, N. Zhang, K. Salem, D. Zhuo (2007)
Compact access control labeling for efficient secure xml query evaluationData Knowl. Eng., 60
J. Hopcroft, J. Ullman (1979)
Introduction to Automata Theory, Languages and Computation
Sriram Mohan, Arijit Sengupta, Yuqing Wu (2005)
Access control for XML: a dynamic query rewriting approach
G. Mella, E. Ferrari, E. Bertino, Yunhua Koglin (2006)
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systemsACM Trans. Inf. Syst. Secur., 9
F. Cuppens, N. Cuppens-Boulahia, Thierry Sans (2005)
Protection of Relationships in XML Documents with the XML-BB Model
Bo Luo, Dongwon Lee, Peng Liu (2007)
Pragmatic XML Access Control Using Off-the-Shelf RDBMS
T. Yu, D. Srivastava, L. Lakshmanan, H. Jagadish (2002)
Compressed Accessibility Map: Efficient Access Control for XML
N. Qi, M. Kudo, J. Myllymaki, H. Pirahesh (2005)
A function-based access control model for XML databases
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati (2000)
Design and implementation of an access control processor for XML documentsComput. Networks, 33
A. Gabillon, Emmanuel Bruno (2001)
Regulating Access to XML documents
Dongwon Lee, Wang-Chien Lee, Peng Liu (2003)
Supporting XML Security Models Using Relational Databases: A Vision
T. Bray, J. Paoli, C. Sperberg-McQueen, Eve Maler (2000)
eXtensible Markup Language (XML) 1.0 (Second Edition)
M. Murata, Akihiko Tozawa, M. Kudo, S. Hada (2006)
XML access control using static analysisACM Trans. Inf. Syst. Secur., 9
R. Sandhu, E. Coyne, H. Feinstein, C. Youman (1996)
Role-Based Access Control ModelsComputer, 29
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati (2000)
Securing XML Documents
G. Mealy (1955)
A method for synthesizing sequential circuitsBell System Technical Journal, 34
Ralph Arnote (1996)
Hong Kong, China
M. Kudo, S. Hada (2000)
XML document security based on provisional authorization
E. Damiani, Majirus Fansi, A. Gabillon, S. Marrara (2007)
Securely Updating XML
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu (2005)
Deep Set Operators for XQuery
Andrei Stoica, C. Farkas (2002)
Secure XML Views
A. Schmidt, F. Waas, M. Kersten, D. Florescu, I. Manolescu, M. Carey, R. Busse
Centrum Voor Wiskunde En Informatica the Xml Benchmark Project
E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati (2002)
A fine-grained access control system for XML documentsACM Trans. Inf. Syst. Secur., 5
I. Fundulaki, maarten marx (2004)
Specifying access control policies for XML documents with XPath
(1997)
Previous version:
E. Fernández, E. Gudes, Haiyan Song (1994)
A Model for Evaluation and Administration of Security in Object-Oriented DatabasesIEEE Trans. Knowl. Data Eng., 6
F. Rabitti, E. Bertino, Won Kim, D. Woelk (1991)
A model of authorization for next-generation database systemsACM Trans. Database Syst., 16
Y. Diao, M. Franklin (2003)
High-Performance XML Filtering: An Overview of YFilterIEEE Data Eng. Bull., 26
Loreto Bravo, J. Cheney, I. Fundulaki (2008)
ACCOn: checking consistency of XML write-access control policies
S. Vimercati, S. Marrara, P. Samarati (2005)
An access control model for querying XML data
(2004)
Galax V 0.3.5
E. Bertino, S. Castano, E. Ferrari (2001)
Securing XML Documents with Author-XIEEE Internet Comput., 5
N. Qi, M. Kudo (2004)
Access-Condition-Table-Driven Access Control for XML Databases
G. Kuper, F. Massacci, Nataliya Rassadko (2005)
Generalized XML security viewsInternational Journal of Information Security, 8
Béatrice Finance, S. Medjdoub, P. Pucheral (2005)
The case for access control on XML relationships
N. Qi, M. Kudo (2005)
XML Access Control with Policy Matching Tree
E. Bertino, E. Ferrari (2002)
Secure and selective dissemination of XML documentsACM Trans. Inf. Syst. Secur., 5
(2003)
XML Path Language (XPath) 2.0 " . W3C Working Draft
Luc Bouganim, François Ngoc, P. Pucheral (2004)
Client-Based Access Control Management for XML documents
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengupta, Yuqing Wu (2006)
ACXESS - Access Control for XML with Enhanced Security Specifications22nd International Conference on Data Engineering (ICDE'06)
I. Fundulaki, S. Maneth (2007)
Formalizing XML access control for update operations
M. Murata, Akihiko Tozawa, M. Kudo, S. Hada (2003)
XML access control using static analysis
Byron Choi (2002)
What are real DTDs like?
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, P. Mitra, Wang-Chien Lee, C. Chu (2006)
In-broker access control: towards efficient end-to-end performance of information brokerage systemsIEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), 1
Huaxin Zhang, Ning Zhang, K. Salem, Donghui Zhuo (2005)
Compact Access Control Labeling for Efficient Secure XML Query Evaluation21st International Conference on Data Engineering Workshops (ICDEW'05)
Tim Moses (2003)
EXtensible Access Control Markup Language (XACML) version 1
Mingfei Jiang, A. Fu (2005)
Integration and efficient lookup of compressed XML accessibility mapsIEEE Transactions on Knowledge and Data Engineering, 17
W. Fan, C. Chan, M. Garofalakis (2004)
Secure XML querying with security views
In this paper, we ask whether XML access control can be supported when underlying (XML or relational) storage system does not provide adequate security features and propose three alternative solutions — primitive , pre-processing , and post-processing . Toward that scenario, in particular, we advocate a scalable and effective pre-processing approach, called QFilter . QFilter is based on non-deterministic finite automata (NFA) and rewrites user’s queries such that parts violating access control rules are pre-pruned. Through analysis and experimental validation, we show that (1) QFilter guarantees that only permissible portion of data is returned to the authorized users, (2) such access controls can be efficiently enforced without relying on security features of underlying storage system, and (3) such independency makes QFilter capable of many emerging applications, such as in-network access control and access control outsourcing.
The VLDB Journal – Springer Journals
Published: Jun 1, 2011
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.