Sciweavers

3 search results - page 1 / 1
» Authorization-Transparent Access Control for XML Under the N...
Sort
View
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 4 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
ACSAC
2003
IEEE
13 years 9 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
GCC
2003
Springer
13 years 9 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou