Proceedings 2004 VLDB Conference 2004
DOI: 10.1016/b978-012088469-8.50011-5
|View full text |Cite
|
Sign up to set email alerts
|

Client-Based Access Control Management for XML documents

Abstract: The erosion of trust put in traditional database servers and in Database Service Providers, the growing interest for different forms of data dissemination and the concern for protecting children from suspicious Internet content are different factors that lead to move the access control from servers to clients. Several encryption schemes can be used to serve this purpose but all suffer from a static way of sharing data. With the emergence of hardware and software security elements on client devices, more dynami… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
53
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 47 publications
(53 citation statements)
references
References 28 publications
0
53
0
Order By: Relevance
“…5, our method used memory in processing did not exceed 255kb, but Bouganim [10]'s method used memory in processing was over 380kb. …”
Section: B Experiments Results and Analysis 1) Memory Usagementioning
confidence: 99%
See 1 more Smart Citation
“…5, our method used memory in processing did not exceed 255kb, but Bouganim [10]'s method used memory in processing was over 380kb. …”
Section: B Experiments Results and Analysis 1) Memory Usagementioning
confidence: 99%
“…The client-based XML document streams access control [10] and decides an access status for currently input data by avoiding the rewriting of queries and performing simultaneous access control rules with query evaluations. It is a technique that obtains a final secure XML document for final user queries by passing the XML document corresponding to user queries to the automata (access rules automata (ARA)), which is unlike Luo [11]'s method that remakes the user queries by creating ARA for access control rules.…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, our proposal leaves space for further work. Other inspiring approaches [14], [24] enforce client-based access control to XML. Indeed, in [14] and [24], the document is encrypted at the server side and decrypted at the client side.…”
Section: Resultsmentioning
confidence: 99%
“…Other inspiring approaches [14], [24] enforce client-based access control to XML. Indeed, in [14] and [24], the document is encrypted at the server side and decrypted at the client side. The input of their system is then XML data and the output is also XML data, while in our approach both the input and output is an XML query.…”
Section: Resultsmentioning
confidence: 99%
“…Various proposals in support of fine-grained XML access control have been introduced in the literature. These include View-based [2,8,9], Non-Deterministic Finite Automata (NFA)-based [4,21,22], RDBMS-based [18,19,27] XML Access Control Enforcement Techniques, etc. The idea of view-based access control is to create and maintain separate view for each user based on the authorization rules.…”
Section: Related Workmentioning
confidence: 99%