Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

A systematic literature review of authorization and access control requirements and current state of the art for different database models

AKYS Mohamed, D Auer, D Hofer… - International Journal of …, 2024 - emerald.com
Purpose Data protection requirements heavily increased due to the rising awareness of data
security, legal requirements and technological developments. Today, NoSQL databases are …

A fine-grained access control system for XML documents

E Damiani, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …

[PDF][PDF] Schema-free xquery

Y Li, C Yu, HV Jagadish - … of the Thirtieth international conference on Very …, 2004 - vldb.org
The widespread adoption of XML holds out the promise that document structure can be
exploited to specify precise database queries. However, the user may have only a limited …

Secure and selective dissemination of XML documents

E Bertino, E Ferrari - ACM Transactions on Information and System …, 2002 - dl.acm.org
XML (eXtensible Markup Language) has emerged as a prevalent standard for document
representation and exchange on the Web. It is often the case that XML documents contain …

Controlling access to published data using cryptography

G Miklau, D Suciu - Proceedings 2003 VLDB Conference, 2003 - Elsevier
Publisher Summary This chapter proposes a framework for enforcing access control policies
on published XML documents using cryptography. In this framework, the owner publishes a …

A trust-based context-aware access control model for web-services

R Bhatti, E Bertino, A Ghafoor - Distributed and Parallel Databases, 2005 - Springer
A key challenge in Web services security is the design of effective access control schemes
that can adequately meet the unique security challenges posed by the Web services …

Zerber+R top-k retrieval from a confidential index

S Zerr, D Olmedilla, W Nejdl, W Siberski - Proceedings of the 12th …, 2009 - dl.acm.org
Privacy-preserving document exchange among collaboration groups in an enterprise as
well as across enterprises requires techniques for sharing and search of access-controlled …

Access-control language for multidomain environments

JBD Joshi - IEEE Internet Computing, 2004 - ieeexplore.ieee.org
The XML role-based access control (X-RBAC) specification language addresses
multidomain environments' policy-specification needs. X-RBAC is based on an extension of …

Access control for databases: Concepts and systems

E Bertino, G Ghinita, A Kamra - Foundations and Trends® in …, 2011 - nowpublishers.com
As organizations depend on, possibly distributed, information systems for operational,
decisional and strategic activities, they are vulnerable to security breaches leading to data …