2003
DOI: 10.1007/978-3-540-39429-7_18
|View full text |Cite
|
Sign up to set email alerts
|

Supporting XML Security Models Using Relational Databases: A Vision

Abstract: Abstract. As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the format of the Internet era for storing and exchanging information, there have been, recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
13
0

Year Published

2007
2007
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…v i is created to control access to partial data in the base table according to the defined security policy. As a result, access types of users could be classified into four classes as follows [21]. The access types are same with granularity types.…”
Section: Access Typesmentioning
confidence: 99%
“…v i is created to control access to partial data in the base table according to the defined security policy. As a result, access types of users could be classified into four classes as follows [21]. The access types are same with granularity types.…”
Section: Access Typesmentioning
confidence: 99%
“…Various proposals in support of fine-grained XML access control have been introduced in the literature. These include View-based [2,8,9], Non-Deterministic Finite Automata (NFA)-based [4,21,22], RDBMS-based [18,19,27] XML Access Control Enforcement Techniques, etc. The idea of view-based access control is to create and maintain separate view for each user based on the authorization rules.…”
Section: Related Workmentioning
confidence: 99%
“…Although, Relational Database Management System, due to its structured nature, becomes inappropriate in the context of World Wide Web, most data for XML documents still reside in relational databases behind the scene. The proposals in [18,27,19] takes advantage of relational model, by mapping all the XML data and access controls rules for XML data (in XML format) into the equivalent relational database and structured query language representation. Finally, the accessibility of the data are checked at the level of relational database representation using the SQL representation of the rules.…”
Section: Related Workmentioning
confidence: 99%
“…As a result, access types of users could be classified into four classes as follows [21]: Class-I: whole data in a table (Table level) Class-II: all data in specific fields (Column level) Class-III: all data in specific tuples (Row level) Class-IV: random data (Cell level)…”
Section: Access Typesmentioning
confidence: 99%