2002
DOI: 10.1007/0-306-47008-x_2
|View full text |Cite
|
Sign up to set email alerts
|

Author-χ: A Java-Based System For XML Data Protection

Abstract: Author-is a Java-based system for access control to XML documents. Author-implements a discretionary access control model specifically tailored to the characteristics of XML documents. In particular, our system allows (i) a set-oriented and single-oriented document protection, by supporting authorizations both at document type and document level; (ii) a differentiated protection of document/document type contents by supporting multi-granularity protection objects and positive/ negative authorizations; (iii) a … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
41
0
1

Year Published

2003
2003
2006
2006

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(42 citation statements)
references
References 3 publications
(2 reference statements)
0
41
0
1
Order By: Relevance
“…Bertino et al [3] have developed Author-X, a Java based system to secure XML documents that enforces access control policies at various granularities and corresponding user credentials. Author-X encodes security policies for a set of XML documents in an XML file referred to as the policy base containing both permissions and prohibitions.…”
Section: Related Workmentioning
confidence: 99%
“…Bertino et al [3] have developed Author-X, a Java based system to secure XML documents that enforces access control policies at various granularities and corresponding user credentials. Author-X encodes security policies for a set of XML documents in an XML file referred to as the policy base containing both permissions and prohibitions.…”
Section: Related Workmentioning
confidence: 99%
“…Bertino et al [2,1] defined access rules at the schema level that apply to all documents conforming to the schema. They define read element/attribute, navigate document, modify/delete contents of element/attribute and add/modify/delete element/attribute.…”
Section: Access-rightmentioning
confidence: 99%
“…But some of the XML data is sensitive, requiring as such the development of models and tools to express access control requirements for multilevel security XML documents. Access control models have been proposed by several researchers [3,4,[7][8][9]. The main focus of these works is to assign access permissions (e.g., security classification labels) to XML documents and tags.…”
Section: Introductionmentioning
confidence: 99%
“…Single security level views can be generated from this file by suppressing all nodes outside the permitted security area [3,7,9]. Figure l(middle) shows the Unclassified partial view of the XML document in Figure 1 (left).…”
Section: Introductionmentioning
confidence: 99%