[PDF][PDF] Efficient secure query evaluation over encrypted XML databases

H Wang, LVS Lakshmanan - … of the 32nd international conference on Very …, 2006 - vldb.org
Motivated by the” database-as-service” paradigm wherein data owned by a client is hosted
on a third-party server, there is significant interest in secure query evaluation over encrypted …

A general approach to securely querying XML

E Damiani, M Fansi, A Gabillon, S Marrara - Computer standards & …, 2008 - Elsevier
XML access control requires the enforcement of highly expressive access control policies to
support schema-, document and object-specific protection requirements. Access control …

Towards a fine-grained access control model and mechanisms for semantic databases

S Franzoni, P Mazzoleni, S Valtolina… - … Conference on Web …, 2007 - ieeexplore.ieee.org
A growing number of domains are adopting semantic models as a centralized gateway to
heterogeneous data sources, or directly for modeling and managing relevant information. In …

Securing XML data in third-party distribution systems

B Carminati, E Ferrari, E Bertino - Proceedings of the 14th ACM …, 2005 - dl.acm.org
Web-based third-party architectures for data publishing are today receiving growing
attention, due to their scalability and the ability to efficiently manage large numbers of users …

fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality

S Oulmakhzoune, N Cuppens-Boulahia… - IFIP Annual Conference …, 2010 - Springer
RDF is an increasingly used framework for describing Web resources, including sensitive
and confidential resources. In this context, we need an expressive language to query RDF …

QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata

B Luo, D Lee, WC Lee, P Liu - The VLDB Journal, 2011 - Springer
In this paper, we ask whether XML access control can be supported when underlying (XML
or relational) storage system does not provide adequate security features and propose three …

Privacy of medical records: From law principles to practice

B Finance, S Medjdoub… - 18th IEEE Symposium on …, 2005 - ieeexplore.ieee.org
Regulating access to electronic health records has become a major social and technical
challenge. Unfortunately, existing access control models fail in translating accurately basic …

Dynamic access-control policies on XML encrypted data

L Bouganim, FD Ngoc, P Pucheral - ACM Transactions on Information …, 2008 - dl.acm.org
The erosion of trust put in traditional database servers and in Database Service Providers
and the growing interest for different forms of selective data dissemination are different …

Authorization-transparent access control for XML under the non-Truman model

Y Kanza, AO Mendelzon, RJ Miller, Z Zhang - International Conference on …, 2006 - Springer
In authorization-transparent access control, user queries are formulated against the
database schema rather than against authorization views that transform and hide data. The …

Pragmatic XML access control using off-the-shelf RDBMS

B Luo, D Lee, P Liu - Computer Security–ESORICS 2007: 12th European …, 2007 - Springer
As the XML model gets more popular, new needs arise to specify access control within XML
model. Various XML access control models and enforcement methods have been proposed …