Edge access control in querying facts stored in graph databases

RKT Akkiraju, D Mukherjee, T Nakamura… - US Patent …, 2018 - Google Patents
Methods and arrangements for managing user access to a graph database. Nodes are
represented in a graph, along with edges which interconnect the nodes. One or more facts …

Optimal security-aware query processing

M Guarnieri, D Basin - Proceedings of the VLDB Endowment, 2014 - dl.acm.org
Security-Aware Query Processing is the problem of computing answers to queries in the
presence of access control policies. We present general impossibility results for the …

A security framework for XML schemas and documents for healthcare

A De la Rosa Algarin, SA Demurjian… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
The extensible Markup Language (XML) has wide usage in healthcare to facilitate health
information exchange via the Continuity of Care Record (CCR) for storing/managing patient …

Evaluating trust and reputation models for IoT environment

M Al-Shamaileh, P Anthony, S Charters - Agents and Multi-Agent Systems …, 2022 - Springer
Abstract The Internet of Things (IoT) provides advanced services by interconnecting a huge
number of heterogeneous smart things (virtual or physical devices) through existing …

Privacy query rewriting algorithm instrumented by a privacy-aware access control model

S Oulmakhzoune, N Cuppens-Boulahia… - annals of …, 2014 - Springer
In this paper, we present an approach to instrument a Simple Protocol And RDF Query
Language query rewriting algorithm enforcing privacy preferences. The term instrument is …

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality

S Oulmakhzoune, N Cuppens-Boulahia… - IFIP Annual Conference …, 2010 - Springer
RDF is an increasingly used framework for describing Web resources, including sensitive
and confidential resources. In this context, we need an expressive language to query RDF …

QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata

B Luo, D Lee, WC Lee, P Liu - The VLDB Journal, 2011 - Springer
In this paper, we ask whether XML access control can be supported when underlying (XML
or relational) storage system does not provide adequate security features and propose three …

Securely updating XML

E Damiani, M Fansi, A Gabillon, S Marrara - Knowledge-Based Intelligent …, 2007 - Springer
We study the problem of updating XML repository through security views. Users are
provided with the view of the repository schema they are entitled to see. They write update …

Generating XACML enforcement policies for role-based access control of XML documents

A De la Rosa Algarín, TB Ziminski… - … Information Systems and …, 2014 - Springer
Ensuring the security of electronic data has morphed into one of the most important
requirements in domains such as health care, where the eXtensible Markup Language …

A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating.

M Mirabi, H Ibrahim, L Fathi, NI Udzir… - Journal of Information …, 2015 - search.ebscohost.com
By specifying a fine-grained access control on the XML data, an accessibility map is
required to determine the accessibility of XML nodes for a specific subject (eg user or role) …