Sciweavers

100 search results - page 5 / 20
» XML document security based on provisional authorization
Sort
View
DOCENG
2010
ACM
13 years 8 months ago
Using model driven engineering technologies for building authoring applications
Building authoring applications is a tedious and complex task that requires a high programming effort. Document technologies, especially XML based ones, can help in reducing such ...
Olivier Beaudoux, Arnaud Blouin, Jean-Marc J&eacut...
SACMAT
2004
ACM
14 years 29 days ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
SWS
2004
ACM
14 years 29 days ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton
DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 9 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
EDBT
2006
ACM
177views Database» more  EDBT 2006»
14 years 7 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...