2003
DOI: 10.1007/978-0-387-35697-6_11
|View full text |Cite
|
Sign up to set email alerts
|

Secure XML Views

Abstract: Recently more and more data is stored in XML format. While XML increases flexibility, it also raises new security challenges such as access control for multilevel security. This paper considers the problem of generating secure and free of semantic conflicts partial views from XML documents. In the context of DTD-based multilevel security classification, we develop techniques to generate single-level DTDs for partial views. For this purpose, we define and manipulate two graphs, a Minimum Semantic Conflict Graph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
43
0

Year Published

2005
2005
2014
2014

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 38 publications
(43 citation statements)
references
References 11 publications
0
43
0
Order By: Relevance
“…In [29], a security view is defined from a DTD specifying nodes accessible by the user. This framework has been widely studied from both the theoretical and practical angle [12,19,13,27,34,28,14].…”
Section: Annotated Dtdsmentioning
confidence: 99%
“…In [29], a security view is defined from a DTD specifying nodes accessible by the user. This framework has been widely studied from both the theoretical and practical angle [12,19,13,27,34,28,14].…”
Section: Annotated Dtdsmentioning
confidence: 99%
“…Two main approaches have been suggested in the literature: view materialization [7,8,9,10,11,12] and query transformation [13]. Most proposals are actually based on view materialization.…”
Section: Related Workmentioning
confidence: 99%
“…In the last few years, several XML access control models have been proposed (after the initial proposal appeared in [1], refinements were described in [2], [22], [18], [6], [13], [17]) which use access policies to compute secure views on XML data sets. These models addressed issues like granularity of access, access-control inheritance, overriding, and conflict resolution.…”
Section: Related Workmentioning
confidence: 99%