Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

A fine-grained access control system for XML documents

E Damiani, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …

Controlling access to published data using cryptography

G Miklau, D Suciu - Proceedings 2003 VLDB Conference, 2003 - Elsevier
Publisher Summary This chapter proposes a framework for enforcing access control policies
on published XML documents using cryptography. In this framework, the owner publishes a …

XML access control using static analysis

M Murata, A Tozawa, M Kudo, S Hada - ACM Transactions on …, 2006 - dl.acm.org
Access control policies for XML typically use regular path expressions such as XPath for
specifying the objects for access-control policies. However such access-control policies are …

Aggregation queries in the database-as-a-service model

E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …

[BOOK][B] Ontologies-based business integration

M Rebstock, F Janina, H Paulheim - 2008 - books.google.com
E-business integration is a vision we have developed over a long period of time. As we have
worked in business practice for many years prior to and in parallel with our academic …

Specifying access control policies for XML documents with XPath

I Fundulaki, M Marx - Proceedings of the ninth ACM symposium on …, 2004 - dl.acm.org
Access control for XML documents is a non-trivial topic, as can be witnessed from the
number of approaches presented in the literature. Trying to compare these, we discovered …

[BOOK][B] Access Control in Data Management Systems: A Visual Querying Perspective

E Ferrari - 2022 - books.google.com
Access control is one of the fundamental services that any Data Management System should
provide. Its main goal is to protect data from unauthorized read and write operations. This is …

RDF metadata for XML access control

V Gowadia, C Farkas - Proceedings of the 2003 ACM workshop on XML …, 2003 - dl.acm.org
In this paper we present an access control framework that provides flexible security
granularity for XML documents. RDF statements are used to represent security objects and …

Secure XML publishing without information leakage in the presence of data inference

X Yang, C Li - VLDB, 2004 - books.google.com
Recent applications are seeing an increasing need that publishing XML documents should
meet precise security requirements. In this paper, we consider data-publishing applications …