Sciweavers

169 search results - page 3 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
SACMAT
2003
ACM
13 years 10 months ago
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is...
Gustaf Neumann, Mark Strembeck
KES
2007
Springer
13 years 11 months ago
A Rewrite Based Approach for Enforcing Access Constraints for XML
Abstract. Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in recent literature. Recently a case has been made for exp...
Sriram Mohan, Arijit Sengupta, Yuqing Wu
CCS
2008
ACM
13 years 6 months ago
On spatio-temporal constraints and inheritance in role-based access control
Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based acces...
Liang Chen, Jason Crampton
ICDCIT
2004
Springer
13 years 10 months ago
Querying XML Documents from a Relational Database in the Presence of DTDs
Abstract. Many researchers have investigated the problem of storing and querying XML documents using an RDBMS. Two situations are considered in this approach based on whether or no...
Manjeet Rege, Izabell Caraconcea, Shiyong Lu, Fars...
BXML
2004
13 years 6 months ago
Metaschema Layering for XML
: The Extensible Markup Language (XML) is based on the concept of schema languages, which are used for validation of XML documents. In most cases, the metamodeling view of XML-base...
Erik Wilde