Proceedings of the 2003 ACM Workshop on XML Security 2003
DOI: 10.1145/968559.968568
|View full text |Cite
|
Sign up to set email alerts
|

Access control of XML documents considering update operations

Abstract: As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on the security of data communication using digital signatures or encryption technologies. As XML is also used for a data representation of data storage, XML security comes to involve not only communication security but also managerial security. Managerial security is guaranteed through access control, but existing XML access control model… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2004
2004
2007
2007

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(14 citation statements)
references
References 8 publications
(23 reference statements)
0
14
0
Order By: Relevance
“…The model proposed by Damiani et al [6] is very popular and Fundulaki et al [8], Fan et al [7], Kuper et al [13] and Luo et al [15] propose models that are similar to [6]. Lim et al [14] propose a more sophisticated priority-based access control model. Recently, some new standards for XML access control, such as XACML have also emerged.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The model proposed by Damiani et al [6] is very popular and Fundulaki et al [8], Fan et al [7], Kuper et al [13] and Luo et al [15] propose models that are similar to [6]. Lim et al [14] propose a more sophisticated priority-based access control model. Recently, some new standards for XML access control, such as XACML have also emerged.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, work has been reported on updating XML views [14]. However, to the best of our knowledge, no work has been done on the problem of adapting XPath views.…”
Section: Introductionmentioning
confidence: 99%
“…Developing an access control model, and related mechanism, in terms of XML is an important step. With the rapid development of web environments XML data access control has been intensively studied (e.g., [2,8,4,5,3,1,7]). However, these existing research works on XML do not offer more advanced access control features such as authorization delegation.…”
Section: Introductionmentioning
confidence: 99%
“…The model in [Lim03] is based on the model defined in [Dam00]. the access control strategy that they use for handling the write privilege is not clearly described.…”
mentioning
confidence: 99%