Sciweavers

123 search results - page 15 / 25
» Confidentiality Policies and Their Enforcement for Controlle...
Sort
View
SEC
2007
13 years 9 months ago
A Middleware Architecture for Integrating Privacy Preferences and Location Accuracy
Location-Based Access Control (LBAC) systems support the evaluation of conditions on locations in the enforcement of access control policies. The ability to evaluate conditions on ...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
DASFAA
2007
IEEE
188views Database» more  DASFAA 2007»
14 years 1 months ago
Security-Conscious XML Indexing
To support secure exchanging and sharing of XML data over the Internet, a myriad of XML access control mechanisms have been proposed. In the setting of node-level fine-grained acc...
Yan Xiao, Bo Luo, Dongwon Lee
DISCEX
2003
IEEE
14 years 25 days ago
Dynamic Authorization and Intrusion Response in Distributed Systems
This paper¢ presents an authorization framework for supporting fine-grained access control policies enhanced with light-weight intrusion/misuse detectors and response capabiliti...
Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim
SIS
2007
13 years 9 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
14 years 9 months ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...