Proceedings of the 20th ACM Symposium on Access Control Models and Technologies 2015
DOI: 10.1145/2752952.2752963
|View full text |Cite
|
Sign up to set email alerts
|

Towards Attribute-Based Authorisation for Bidirectional Programming

Abstract: Bidirectional programming allows developers to write programs that will produce transformations that extract data from a source document into a view. The same transformations can then be used to update the source in order to propagate the changes made to the view, provided that the transformations satisfy two essential properties.Bidirectional transformations can provide a form of authorisation mechanism. From a source containing sensitive data, a view can be extracted that only contains the information to be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 31 publications
0
3
0
Order By: Relevance
“…Similarly to our approach, a dedicated policy language is used by [38], from which a lens is automatically generated to enforce access control for XML documents. In addition to the attributes and context of the assets (XML nodes), the XQuery-based policy can take into account external (subject or context) attributes as well.…”
Section: Access Control For Xml Documentsmentioning
confidence: 99%
“…Similarly to our approach, a dedicated policy language is used by [38], from which a lens is automatically generated to enforce access control for XML documents. In addition to the attributes and context of the assets (XML nodes), the XQuery-based policy can take into account external (subject or context) attributes as well.…”
Section: Access Control For Xml Documentsmentioning
confidence: 99%
“…Similarly to our approach, a dedicated policy language is used by Montrieux and Hu [68], from which a transformation (lens) is automatically generated to enforce access control for XML documents. In addition to the attributes and context of the assets (XML nodes), the XQuery-based policy can take into account external (subject or context) attributes as well.…”
Section: Fine-grained Access Control In Various Domainsmentioning
confidence: 99%
“…Similarly to our approach, a dedicated policy is used by [30], from which a lens is automatically generated to enforce access control for XML documents. In addition to the attributes and context of the assets (XML nodes), the XQuerybased policy can take into account external (subject or context) attributes as well.…”
Section: Related Workmentioning
confidence: 99%