[PDF][PDF] Schema-free xquery

Y Li, C Yu, HV Jagadish - … of the Thirtieth international conference on Very …, 2004 - vldb.org
The widespread adoption of XML holds out the promise that document structure can be
exploited to specify precise database queries. However, the user may have only a limited …

Secure XML querying with security views

W Fan, CY Chan, M Garofalakis - Proceedings of the 2004 ACM …, 2004 - dl.acm.org
The prevalent use of XML highlights the need for a generic, flexible access-control
mechanism for XML documents that supports efficient and secure query access, without …

Aggregation queries in the database-as-a-service model

E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …

Specifying access control policies for XML documents with XPath

I Fundulaki, M Marx - Proceedings of the ninth ACM symposium on …, 2004 - dl.acm.org
Access control for XML documents is a non-trivial topic, as can be witnessed from the
number of approaches presented in the literature. Trying to compare these, we discovered …

QFilter: fine-grained run-time XML access control via NFA-based query rewriting

B Luo, D Lee, WC Lee, P Liu - Proceedings of the thirteenth ACM …, 2004 - dl.acm.org
At present, most of the state-of-the-art solutions for XML access controls are either (1)
document-level access control techniques that are too limited to support fine-grained …

Rewriting regular XPath queries on XML views

W Fan, F Geerts, X Jia… - 2007 IEEE 23rd …, 2006 - ieeexplore.ieee.org
We study the problem of answering queries posed on virtual views of XML documents, a
problem commonly encountered when enforcing XML access control and integrating data …

Client-based access control management for xml

L Bouganim, FD Ngoc, P Pucheral - … of the Very Large Data Bases, 2004 - books.google.com
The erosion of trust put in traditional database servers and in Database Service Providers,
the growing interest for different forms of data dissemination and the concern for protecting …

Generalized XML security views

G Kuper, F Massacci, N Rassadko - … of the tenth ACM symposium on …, 2005 - dl.acm.org
We investigate a generalization of the notion of XML security view introduced by Stoica and
Farkas [17] and later refined by Fan et al.[8]. The model consists of access control policies …

Enforcing secure and privacy-preserving information brokering in distributed information sharing

F Li, B Luo, P Liu, D Lee, CH Chu - IEEE transactions on …, 2013 - ieeexplore.ieee.org
Today's organizations raise an increasing need for information sharing via on-demand
access. Information brokering systems (IBSs) have been proposed to connect large-scale …

Method and system for providing path-level access control for structured documents stored in a database

S Hada, M Kudo, N Seki, A Tozawa… - US Patent …, 2014 - Google Patents
An improved method and system for providing path-level access control to a structured
document in a collection stored in a database, where the structured document includes a …