DOI: 10.4242/balisagevol1.muldner01
|View full text |Cite
|
Sign up to set email alerts
|

Secure Publishing using Schema-level Role-based Access Control Policies for Fragments of XML Documents

Abstract: Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a hi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…(Müldner et al , 2006) described key generation at the document level, and (Bertino et al , 2002; Zhang et al , 2003) describe how to generate keys for documents and for DTDs/schema; however, since at the schema level some conditions cannot be evaluated, keys must be generated at both the schema and document levels. A more recent paper (Müldner et al , 2008) described schema‐level key generation, but it only described the implementation using symbolic grammar paths. In addition, testing was limited to a single schema, and two documents valid in this schema, for which the average multi‐encryption and decryption time was provided.…”
Section: Related Workmentioning
confidence: 99%
“…(Müldner et al , 2006) described key generation at the document level, and (Bertino et al , 2002; Zhang et al , 2003) describe how to generate keys for documents and for DTDs/schema; however, since at the schema level some conditions cannot be evaluated, keys must be generated at both the schema and document levels. A more recent paper (Müldner et al , 2008) described schema‐level key generation, but it only described the implementation using symbolic grammar paths. In addition, testing was limited to a single schema, and two documents valid in this schema, for which the average multi‐encryption and decryption time was provided.…”
Section: Related Workmentioning
confidence: 99%