Edge access control in querying facts stored in graph databases
RKT Akkiraju, D Mukherjee, T Nakamura… - US Patent …, 2018 - Google Patents
Methods and arrangements for managing user access to a graph database. Nodes are
represented in a graph, along with edges which interconnect the nodes. One or more facts …
represented in a graph, along with edges which interconnect the nodes. One or more facts …
Optimal security-aware query processing
Security-Aware Query Processing is the problem of computing answers to queries in the
presence of access control policies. We present general impossibility results for the …
presence of access control policies. We present general impossibility results for the …
A security framework for XML schemas and documents for healthcare
A De la Rosa Algarin, SA Demurjian… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
The extensible Markup Language (XML) has wide usage in healthcare to facilitate health
information exchange via the Continuity of Care Record (CCR) for storing/managing patient …
information exchange via the Continuity of Care Record (CCR) for storing/managing patient …
Evaluating trust and reputation models for IoT environment
Abstract The Internet of Things (IoT) provides advanced services by interconnecting a huge
number of heterogeneous smart things (virtual or physical devices) through existing …
number of heterogeneous smart things (virtual or physical devices) through existing …
Privacy query rewriting algorithm instrumented by a privacy-aware access control model
In this paper, we present an approach to instrument a Simple Protocol And RDF Query
Language query rewriting algorithm enforcing privacy preferences. The term instrument is …
Language query rewriting algorithm enforcing privacy preferences. The term instrument is …
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality
RDF is an increasingly used framework for describing Web resources, including sensitive
and confidential resources. In this context, we need an expressive language to query RDF …
and confidential resources. In this context, we need an expressive language to query RDF …
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
In this paper, we ask whether XML access control can be supported when underlying (XML
or relational) storage system does not provide adequate security features and propose three …
or relational) storage system does not provide adequate security features and propose three …
Securely updating XML
We study the problem of updating XML repository through security views. Users are
provided with the view of the repository schema they are entitled to see. They write update …
provided with the view of the repository schema they are entitled to see. They write update …
Generating XACML enforcement policies for role-based access control of XML documents
A De la Rosa Algarín, TB Ziminski… - … Information Systems and …, 2014 - Springer
Ensuring the security of electronic data has morphed into one of the most important
requirements in domains such as health care, where the eXtensible Markup Language …
requirements in domains such as health care, where the eXtensible Markup Language …
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating.
By specifying a fine-grained access control on the XML data, an accessibility map is
required to determine the accessibility of XML nodes for a specific subject (eg user or role) …
required to determine the accessibility of XML nodes for a specific subject (eg user or role) …