[PDF][PDF] Schema-free xquery
The widespread adoption of XML holds out the promise that document structure can be
exploited to specify precise database queries. However, the user may have only a limited …
exploited to specify precise database queries. However, the user may have only a limited …
Secure XML querying with security views
The prevalent use of XML highlights the need for a generic, flexible access-control
mechanism for XML documents that supports efficient and secure query access, without …
mechanism for XML documents that supports efficient and secure query access, without …
Aggregation queries in the database-as-a-service model
E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …
servers belonging to potentially untrusted service providers. To maintain data confidentiality …
Specifying access control policies for XML documents with XPath
Access control for XML documents is a non-trivial topic, as can be witnessed from the
number of approaches presented in the literature. Trying to compare these, we discovered …
number of approaches presented in the literature. Trying to compare these, we discovered …
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1)
document-level access control techniques that are too limited to support fine-grained …
document-level access control techniques that are too limited to support fine-grained …
Rewriting regular XPath queries on XML views
We study the problem of answering queries posed on virtual views of XML documents, a
problem commonly encountered when enforcing XML access control and integrating data …
problem commonly encountered when enforcing XML access control and integrating data …
Client-based access control management for xml
The erosion of trust put in traditional database servers and in Database Service Providers,
the growing interest for different forms of data dissemination and the concern for protecting …
the growing interest for different forms of data dissemination and the concern for protecting …
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and
Farkas [17] and later refined by Fan et al.[8]. The model consists of access control policies …
Farkas [17] and later refined by Fan et al.[8]. The model consists of access control policies …
Enforcing secure and privacy-preserving information brokering in distributed information sharing
Today's organizations raise an increasing need for information sharing via on-demand
access. Information brokering systems (IBSs) have been proposed to connect large-scale …
access. Information brokering systems (IBSs) have been proposed to connect large-scale …
Method and system for providing path-level access control for structured documents stored in a database
An improved method and system for providing path-level access control to a structured
document in a collection stored in a database, where the structured document includes a …
document in a collection stored in a database, where the structured document includes a …