Database security-concepts, approaches, and challenges
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …
daily business, they become more vulnerable to security breaches even as they gain …
A fine-grained access control system for XML documents
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …
is optimal for public information. The distribution and sharing of information via the Web that …
Controlling access to published data using cryptography
Publisher Summary This chapter proposes a framework for enforcing access control policies
on published XML documents using cryptography. In this framework, the owner publishes a …
on published XML documents using cryptography. In this framework, the owner publishes a …
XML access control using static analysis
Access control policies for XML typically use regular path expressions such as XPath for
specifying the objects for access-control policies. However such access-control policies are …
specifying the objects for access-control policies. However such access-control policies are …
Aggregation queries in the database-as-a-service model
E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …
servers belonging to potentially untrusted service providers. To maintain data confidentiality …
[BOOK][B] Ontologies-based business integration
M Rebstock, F Janina, H Paulheim - 2008 - books.google.com
E-business integration is a vision we have developed over a long period of time. As we have
worked in business practice for many years prior to and in parallel with our academic …
worked in business practice for many years prior to and in parallel with our academic …
Specifying access control policies for XML documents with XPath
Access control for XML documents is a non-trivial topic, as can be witnessed from the
number of approaches presented in the literature. Trying to compare these, we discovered …
number of approaches presented in the literature. Trying to compare these, we discovered …
[BOOK][B] Access Control in Data Management Systems: A Visual Querying Perspective
E Ferrari - 2022 - books.google.com
Access control is one of the fundamental services that any Data Management System should
provide. Its main goal is to protect data from unauthorized read and write operations. This is …
provide. Its main goal is to protect data from unauthorized read and write operations. This is …
RDF metadata for XML access control
In this paper we present an access control framework that provides flexible security
granularity for XML documents. RDF statements are used to represent security objects and …
granularity for XML documents. RDF statements are used to represent security objects and …
Secure XML publishing without information leakage in the presence of data inference
Recent applications are seeing an increasing need that publishing XML documents should
meet precise security requirements. In this paper, we consider data-publishing applications …
meet precise security requirements. In this paper, we consider data-publishing applications …