In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Processing XML documents in multi-user database management environments requires a suitable storage model of XML data, support of typical XML document processing (XDP) interfaces, ...