Sciweavers

169 search results - page 2 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
ACSAC
2003
IEEE
13 years 9 months ago
A Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing a...
Ramaswamy Chandramouli
SIGMOD
2006
ACM
142views Database» more  SIGMOD 2006»
14 years 4 months ago
Model driven development of secure XML databases
In this paper, we propose a methodological approach for the model driven development of secure XML databases (DB). This proposal is within the framework of MIDAS, a model driven m...
Belén Vela, Eduardo Fernández-Medina, Esperanza ...
KES
2008
Springer
13 years 4 months ago
A Secure Mediator for Integrating Multiple Level Access Control Policies
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Isabel F. Cruz, Rigel Gjomemo, Mirko Orsini
ICDE
2007
IEEE
164views Database» more  ICDE 2007»
13 years 10 months ago
Multi-session Separation of Duties (MSoD) for RBAC
Separation of duties (SoD) is a key security requirement for many business and information systems. Role Based Access Controls (RBAC) is a relatively new paradigm for protecting i...
David W. Chadwick, Wensheng Xu, Sassa Otenko, Roma...
ICWE
2004
Springer
13 years 10 months ago
Representing XML Schema in UML - A Comparison of Approaches
Abstract. There is a need to integrate XML schemas, i.e., schemas written in XML Schema, into UML-based software development processes. Not only the production of XML schemas out o...
Martin Bernauer, Gerti Kappel, Gerhard Kramler