2009
DOI: 10.1007/978-3-642-01244-0_26
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-Based Secure XML Content Distribution

Abstract: This paper presents an ontology-driven secure XML content distribution scheme. This scheme first relies on a semantic access control model for XML documents that achieves three objectives: (1) representing flexible and evolvable policies, (2) providing a high-level mapping and interoperable interface to documents, and (3) automating the granting of fine-grained access rights by inferring on content semantics. A novel XML document parsing mechanism is defined to delegate document access control enforcement to a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
12
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…PUBLISH/SUBSCRIBE MODEL Publish/subscribe XML content dissemination works as follows ( Figure 3): (1) Prior to the first document publication, a publisher provides authorization policies to determine user authorizations which will be enforced by the dissemina- tion network. These policies can be flexible and may evolve (see [1]). (2) An end user sends a subscription request with valid credentials (e.g.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…PUBLISH/SUBSCRIBE MODEL Publish/subscribe XML content dissemination works as follows ( Figure 3): (1) Prior to the first document publication, a publisher provides authorization policies to determine user authorizations which will be enforced by the dissemina- tion network. These policies can be flexible and may evolve (see [1]). (2) An end user sends a subscription request with valid credentials (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…(4) Disseminators follow a dissemination protocol (detailed in [17]) in order to route the encoded XML document portions selectively to all authorized subscribers. The recipient verifies the received XML content by decoding the EBOL-based encoding, both semantically and structurally, in a verification phase which is detailed in our previous work [1].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations