Sciweavers

800 search results - page 6 / 160
» XML access control using static analysis
Sort
View
91
Voted
XMLSEC
2003
ACM
15 years 3 months ago
Access control of XML documents considering update operations
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Chung-Hwan Lim, Seog Park, Sang Hyuk Son
BTW
2005
Springer
177views Database» more  BTW 2005»
15 years 3 months ago
Adaptive XML Access Control Based on Query Nesting, Modification and Simplification
: Access control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative acces...
Stefan Böttcher, Rita Steinmetz
69
Voted
ISSTA
2006
ACM
15 years 4 months ago
Role-Based access control consistency validation
Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict ac...
Paolina Centonze, Gleb Naumovich, Stephen J. Fink,...
CIKM
2004
Springer
15 years 3 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
104
Voted
XSYM
2004
Springer
89views Database» more  XSYM 2004»
15 years 3 months ago
A Runtime System for XML Transformations in Java
We show that it is possible to extend a general-purpose programming language with a convenient high-level data-type for manipulating XML documents while permitting (1) precise stat...
Aske Simon Christensen, Christian Kirkegaard, Ande...