Sciweavers

86 search results - page 1 / 18
» A Schema Based Approach to Valid XML Access Control
Sort
View
JISE
2010
82views more  JISE 2010»
12 years 11 months ago
A Schema Based Approach to Valid XML Access Control
Changwoo Byun, Seog Park
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 6 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
WISE
2002
Springer
13 years 9 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
ADVIS
2006
Springer
13 years 11 months ago
Validation of XML Documents: From UML Models to XML Schemas and XSLT Stylesheets
The widespread use of XML brings out the need of ensuring the validity of XML data. The use of languages such as XML Schema makes easier the process of verification of XML documen...
Eladio Domínguez, Jorge Lloret, Angel Luis ...
KES
2008
Springer
13 years 4 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini