Purpose Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are …
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing of information via the Web that …
Y Li, C Yu, HV Jagadish - … of the Thirtieth international conference on Very …, 2004 - vldb.org
The widespread adoption of XML holds out the promise that document structure can be exploited to specify precise database queries. However, the user may have only a limited …
E Bertino, E Ferrari - ACM Transactions on Information and System …, 2002 - dl.acm.org
XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain …
G Miklau, D Suciu - Proceedings 2003 VLDB Conference, 2003 - Elsevier
Publisher Summary This chapter proposes a framework for enforcing access control policies on published XML documents using cryptography. In this framework, the owner publishes a …
R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes that can adequately meet the unique security challenges posed by the Web services …
Privacy-preserving document exchange among collaboration groups in an enterprise as well as across enterprises requires techniques for sharing and search of access-controlled …
JBD Joshi - IEEE Internet Computing, 2004 - ieeexplore.ieee.org
The XML role-based access control (X-RBAC) specification language addresses multidomain environments' policy-specification needs. X-RBAC is based on an extension of …
E Bertino, G Ghinita, A Kamra - Foundations and Trends® in …, 2011 - nowpublishers.com
As organizations depend on, possibly distributed, information systems for operational, decisional and strategic activities, they are vulnerable to security breaches leading to data …