Aggregation queries in the database-as-a-service model

E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …

A general approach to securely querying XML

E Damiani, M Fansi, A Gabillon, S Marrara - Computer standards & …, 2008 - Elsevier
XML access control requires the enforcement of highly expressive access control policies to
support schema-, document and object-specific protection requirements. Access control …

The role of agents in distributed data mining: Issues and benefits

M Klusch, S Lodi, M Gianluca - IEEE/WIC International …, 2003 - ieeexplore.ieee.org
The increasing demand to extend data mining technology to data sets inherently distributed
among a large number of autonomous and heterogeneous sources over a network with …

Consistency and repair for XML write-access control policies

L Bravo, J Cheney, I Fundulaki, R Segovia - The VLDB journal, 2012 - Springer
XML access control policies involving updates may contain security flaws, here called
inconsistencies, in which a forbidden operation may be simulated by performing a sequence …

Impact of technology evolution on the materialised views: current issues and future trends

A Sebaa, A Nouicer, A Tari - International Journal of …, 2019 - inderscienceonline.com
To improve query performance materialised views were largely used for such purpose. So
far, this technique has been a success as testified by the large and increasing interest …

HyXAC: HYBRID XML access control integrating view-based and query-rewriting approaches

M Thimma, F Liu, J Lin, B Luo - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the increasing usage of XML on information sharing over the Internet, a mechanism for
defining and enforcing XML access control is demanded, such that only authorized entities …

A method of Jia Gu Wen recognition based on a two-level classification

XL Zhou, XC Hua, F Li - Proceedings of 3rd International …, 1995 - ieeexplore.ieee.org
Jia Gu Wen is the earliest Chinese character. Since it has many of the properties of
drawings, common recognition methods cannot be efficiently applied. We provide a …

ACCOn: checking consistency of XML write-access control policies

L Bravo, J Cheney, I Fundulaki - … of the 11th international conference on …, 2008 - dl.acm.org
XML access control policies involving updates may contain security flaws, here called
inconsistencies, in which a forbidden operation may be simulated by performing a sequence …

QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata

B Luo, D Lee, WC Lee, P Liu - The VLDB Journal, 2011 - Springer
In this paper, we ask whether XML access control can be supported when underlying (XML
or relational) storage system does not provide adequate security features and propose three …

HyXAC: a hybrid approach for XML access control

M Thimma, TK Tsui, B Luo - Proceedings of the 18th ACM symposium …, 2013 - dl.acm.org
While XML has been widely adopted for information sharing over the Internet, the need for
efficient XML access control naturally arise. Various XML access control enforcement …