2001
DOI: 10.1109/4236.935172
|View full text |Cite
|
Sign up to set email alerts
|

Securing XML documents with Author-X

Abstract: This Java-based access-control system supports secure XML document administration at varying levels of granularity.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
113
0
3

Year Published

2004
2004
2006
2006

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 180 publications
(116 citation statements)
references
References 7 publications
(3 reference statements)
0
113
0
3
Order By: Relevance
“…Moreover, once data is copied, it is at the user's discretion. The work closest to ours is in XML access control, which is an active research area concerned with controlling access to constituent parts of XML documents (e.g., [7,15,19,2,1,10,9]). We shall first discuss the primary characteristics of this work, and then examine several prominent proposals.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, once data is copied, it is at the user's discretion. The work closest to ours is in XML access control, which is an active research area concerned with controlling access to constituent parts of XML documents (e.g., [7,15,19,2,1,10,9]). We shall first discuss the primary characteristics of this work, and then examine several prominent proposals.…”
Section: Related Workmentioning
confidence: 99%
“…Bertino et al [2,1] have proposed an approach to XML access control consisting of two parts: an access-control system Author-χ, and a credentials and policy language χ-Sec. Their proposal goes beyond XML access control in that they actually consider semi-structured data encoded in XML documents.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The considered input documents are XML documents, the de-facto standard for data exchange. Authorization models proposed for regulating access to XML documents use XPath expressions to delineate the scope of each access control rule [BCF01,GaB01,DDP02]. Having this context in mind, the problem addressed in this paper can be stated as follows.…”
Section: Introductionmentioning
confidence: 99%
“…The data are kept encrypted at the server and a client is granted access to subparts of them according to the decryption keys in its possession. Sophisticated variations of this basic model have been designed in different context, such as DSP [HIL02], database server security [HeW01], nonprofit and for-profit publishing [MiS03,BCF01,Med] and multilevel databases [AkT82,BZN01,RRN02]. These models differ in several ways: data access model (pulled vs. pushed), access right model (DAC, RBAC, MAC), encryption scheme, key delivery mechanism and granularity of sharing.…”
Section: Introductionmentioning
confidence: 99%