2007
DOI: 10.1007/978-3-540-74835-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Pragmatic XML Access Control Using Off-the-Shelf RDBMS

Abstract: Abstract. As the XML model gets more popular, new needs arise to specify access control within XML model. Various XML access control models and enforcement methods have been proposed recently. However, by and large, these approaches either assume the support of security features from XML databases or use proprietary tools outside of databases. Since there are currently few commercial XML databases with such capabilities, the proposed approaches are not yet practical. Therefore, we explore the problem of "Is is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 41 publications
0
7
0
Order By: Relevance
“…Theoretical work on access control has led to several frameworks for representing access control policies in flexible, fine-grained ways, e.g. [12,17,27]. Rather than assuming a particular policy model, such as DAC, MAC, or RBAC, these frameworks typically provide a way to represent access control rules (ACRs) [22] that may apply to individual users, roles, and groups, as well as to objects, fields, and collections of objects.…”
Section: Relational Access Control (Rac)mentioning
confidence: 99%
See 1 more Smart Citation
“…Theoretical work on access control has led to several frameworks for representing access control policies in flexible, fine-grained ways, e.g. [12,17,27]. Rather than assuming a particular policy model, such as DAC, MAC, or RBAC, these frameworks typically provide a way to represent access control rules (ACRs) [22] that may apply to individual users, roles, and groups, as well as to objects, fields, and collections of objects.…”
Section: Relational Access Control (Rac)mentioning
confidence: 99%
“…Relational access control (RAC) has been the subject of considerable study in contexts where fine-grained permissions must routinely be assigned, e.g. for XML documents [21,22,26,27]. But to our knowledge the RAC paradigm has not yet been recognized as a significant alternative for collaboration systems.…”
Section: Relational Access Control (Rac)mentioning
confidence: 99%
“…Several researchers have proposed to use the mature relational database technology to store, secure and query XML data [1,5,6,11,12]. Although relational databases support table level and tuple level access control mechanism, they do not provide node-level restriction mechanisms for the hierarchical XML data.…”
Section: Introductionmentioning
confidence: 99%
“…There are many algorithms proposed to secure native XML documents, such as [2], [4], [6], [9]. However, there are a few algorithms proposed to apply XML access control technique for XML documents stored in relational databases, such as [10], [11], and [15]. In [10], [11], the XML documents stored in relational database without using XML schema.…”
Section: Introductionmentioning
confidence: 99%
“…However, there are a few algorithms proposed to apply XML access control technique for XML documents stored in relational databases, such as [10], [11], and [15]. In [10], [11], the XML documents stored in relational database without using XML schema. The proposed technique in [15] used XML schema in storing XML documents in relational database, but it had the following drawbacks [14]:…”
Section: Introductionmentioning
confidence: 99%