2002
DOI: 10.1145/545186.545190
|View full text |Cite
|
Sign up to set email alerts
|

Secure and selective dissemination of XML documents

Abstract: XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
220
0
2

Year Published

2003
2003
2014
2014

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 262 publications
(222 citation statements)
references
References 17 publications
0
220
0
2
Order By: Relevance
“…Many proposals on access control mechanisms have been presented in both database literature [9,11,10,12,22] and XML area [3,5,7]. There are however few proposals on access controls across heterogeneous data models, and the most related works are those on secure XML federations [27] and XML security models using relational databases [13].…”
Section: Related Workmentioning
confidence: 99%
“…Many proposals on access control mechanisms have been presented in both database literature [9,11,10,12,22] and XML area [3,5,7]. There are however few proposals on access controls across heterogeneous data models, and the most related works are those on secure XML federations [27] and XML security models using relational databases [13].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, many access control methods extending the XML model to incorporate security aspects have been proposed (e.g., XACML [11], [6], [2], [23]). To the lesser or greater extent, however, such proposals neglect the fact that the most data for XML documents still reside in relational databases behind the scenes, and consequently do not utilize various security models that have been proposed for and implemented in relational databases.…”
Section: Xmlmentioning
confidence: 99%
“…In [6], the model proposed in [7] is extended by enriching the authorization types supported by the model, providing a complete description of the specification and enforcement mechanism. Among comparable proposals, in [2], an access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Finally, the use of authorization priorities with propagation and overriding, which is an important aspect of XML access control may recall approaches in the context of object-oriented databases, like [9] and [18].…”
Section: Xml and Relational Security Modelsmentioning
confidence: 99%
“…Recently, many proposals focusing on XML security models or enforcement mechanisms have appeared (e.g., XACML, [3], [1]). However, XML query processing issues using indices in dealing with secure XML data has gotten little attention.…”
Section: Introductionmentioning
confidence: 99%
“…[3] extends [4] by enriching the supported authorization types, providing a complete description of specification and enforcement mechanism. In [1], an access control environment for XML documents and techniques to deal with authorization priorities and conflict resolution issues are proposed. We base our approach on XISS [6].…”
Section: Introductionmentioning
confidence: 99%