메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 61-69

Specifying access control policies for XML documents with XPath

Author keywords

XML; XML access control; XPath

Indexed keywords

ALGORITHMS; DATABASE SYSTEMS; INFORMATION RETRIEVAL SYSTEMS; NATURAL LANGUAGE PROCESSING SYSTEMS; PUBLIC POLICY; QUERY LANGUAGES; SECURITY OF DATA; SEMANTICS; SERVERS;

EID: 4143058056     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990046     Document Type: Conference Paper
Times cited : (81)

References (27)
  • 1
    • 4143075896 scopus 로고    scopus 로고
    • Third Generation Partnership Project. http://3gpp.org.
  • 4
    • 4143133270 scopus 로고    scopus 로고
    • Structural properties of XPath fragments
    • Siena, Italy, January
    • M. Benedikt, W. Fan, and G. Kuper. Structural Properties of XPath Fragments. In ICDT, Siena, Italy, January 2003.
    • (2003) ICDT
    • Benedikt, M.1    Fan, W.2    Kuper, G.3
  • 5
    • 0035791550 scopus 로고    scopus 로고
    • On specifying security policies for web documents with an XML-based language
    • Chantilly, Virginia, USA, May
    • E. Bertino, S. Castano, and E. Ferrari. On Specifying Security Policies for Web Documents with an XML-based language. In SACMAT, Chantilly, Virginia, USA, May 2001.
    • (2001) SACMAT
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 6
    • 0034823621 scopus 로고    scopus 로고
    • Securing XML documents: The author-X project demonstration
    • Santa Barbara, California, USA, May
    • E. Bertino, S. Castano, and E. Ferrari. Securing XML Documents: The Author-X Project Demonstration. In SIGMOD, Santa Barbara, California, USA, May 2001.
    • (2001) SIGMOD
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 7
    • 85134887303 scopus 로고    scopus 로고
    • Specifying and enforcing access control policies for XML document sources
    • E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Specifying and Enforcing Access Control Policies for XML Document Sources. WWW, 3(3), 2000.
    • (2000) WWW , vol.3 , Issue.3
    • Bertino, E.1    Castano, S.2    Ferrari, E.3    Mesiti, M.4
  • 8
    • 0036887410 scopus 로고    scopus 로고
    • Protection and administration of XML data sources
    • E. Bertino, S. Castano, E. Ferrari, and M. Mesiti. Protection and administration of XML data sources. DKE, 43(3):237-260, 2002.
    • (2002) DKE , vol.43 , Issue.3 , pp. 237-260
    • Bertino, E.1    Castano, S.2    Ferrari, E.3    Mesiti, M.4
  • 9
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E. Bertino and E. Ferrari. Secure and Selective Dissemination of XML Documents. TISSEC, 5(3):290-331, 2002.
    • (2002) TISSEC , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 11
    • 1542701202 scopus 로고    scopus 로고
    • Optimizing the secure evaluation of twig queries
    • Hong Kong, China, September
    • S. Cho, S. Amer-Yahia, L. V. S. Lakshmanan, and D. Srivastava. Optimizing the Secure Evaluation of Twig Queries. In VLDB, Hong Kong, China, September 2002.
    • (2002) VLDB
    • Cho, S.1    Amer-Yahia, S.2    Lakshmanan, L.V.S.3    Srivastava, D.4
  • 16
    • 3142749878 scopus 로고    scopus 로고
    • Secure XML querying with security views
    • To appear
    • W. Fan, C-Y. Chan, and M. Garofalakis. Secure XML Querying with Security Views. In SIGMOD, 2004. To appear.
    • (2004) SIGMOD
    • Fan, W.1    Chan, C.-Y.2    Garofalakis, M.3
  • 19
    • 1142275475 scopus 로고    scopus 로고
    • The complexity of XPath query evaluation
    • San Diego, California, USA, June
    • G. Gottlob, C. Koch, and R. Pichler. The complexity of XPath query evaluation. In PODS, pages 179-190, San Diego, California, USA, June 2003.
    • (2003) PODS , pp. 179-190
    • Gottlob, G.1    Koch, C.2    Pichler, R.3
  • 20
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • Tuscon, Arizona, USA, May
    • S. Jajodia, P. Samarati, V. Subrahmanian, and E. Bertino. A Unified Framework for Enforcing Multiple Access Control Policies. In SIGMOD, Tuscon, Arizona, USA, May 1997.
    • (1997) SIGMOD
    • Jajodia, S.1    Samarati, P.2    Subrahmanian, V.3    Bertino, E.4
  • 21
    • 4143145351 scopus 로고    scopus 로고
    • Liberty Alliance Project. http://www.projectliberty.org.
  • 22
    • 35048898057 scopus 로고    scopus 로고
    • XPath with conditional axis relations
    • Crete, Greece, March
    • M. Marx. XPath with conditional axis relations. In EDBT, pages 477-494, Crete, Greece, March 2004.
    • (2004) EDBT , pp. 477-494
    • Marx, M.1
  • 23
    • 4544248702 scopus 로고    scopus 로고
    • XML access control using static analysis
    • Washington, DC, USA, October
    • M. Murata, A. Tozawa, and M. Kudo. XML Access Control using Static Analysis. In CCS, Washington, DC, USA, October 2003.
    • (2003) CCS
    • Murata, M.1    Tozawa, A.2    Kudo, M.3
  • 25
    • 4143140959 scopus 로고    scopus 로고
    • Directories: Managing data for networked applications
    • Los Alamos, California, USA, March Tutorial
    • D. Srivastava. Directories: Managing Data for Networked Applications. In ICDE, Los Alamos, California, USA, March 2000. Tutorial.
    • (2000) ICDE
    • Srivastava, D.1
  • 27
    • 4143112482 scopus 로고    scopus 로고
    • XML Access Control. http://www.trl.ibm.com/projects/xml/xacl/.
    • XML Access Control


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.