Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
BIS
2007
120views Business» more  BIS 2007»
12 years 3 months ago
Security Issues for the Use of Semantic Web in E-Commerce
As the ontologies are the pivotal element of the Semantic Web in E-Commerce, it is necessary to protect the ontology’s integrity and availability. In addition, both suppliers and...
Andreas Ekelhart, Stefan Fenz, A. Min Tjoa, Edgar ...
WISE
2002
Springer
12 years 6 months ago
Towards Translating Authorizations for Transformed XML Documents
Web based services and applications have increased the availability and accessibility of information. XML has recently emerged as an important standard in the area of information ...
Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko K...
HICSS
2003
IEEE
107views Biometrics» more  HICSS 2003»
12 years 7 months ago
XML Access Control for Semantically Related XML Documents
The extensible markup language (XML) is a standard for describing information on the Internet and is quickly becoming the most preferred way to store and exchange information. The...
Vijay Parmar, Hongchi Shi, Su-Shing Chen
CIKM
2004
Springer
12 years 7 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
CIKM
2005
Springer
12 years 7 months ago
The case for access control on XML relationships
With the emergence of XML as the de facto standard to exchange and disseminate information, the problem of regulating access to XML documents has attracted a considerable attentio...
Béatrice Finance, Saïda Medjdoub, Phil...
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
12 years 8 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
EDBT
2008
ACM
137views Database» more  EDBT 2008»
13 years 1 months ago
ACCOn: checking consistency of XML write-access control policies
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of ...
Loreto Bravo, James Cheney, Irini Fundulaki
books