[图书][B] Data on the web: from relations to semistructured data and XML

S Abiteboul, P Buneman, D Suciu - 2000 - books.google.com
The Web is causing a revolution in how we represent, retrieve, and process information Its
growth has given us a universally accessible database-but in the form of a largely …

Rights protection for relational data

R Sion, M Atallah, S Prabhakar - Proceedings of the 2003 ACM SIGMOD …, 2003 - dl.acm.org
Protecting rights over relational data is of ever increasing interest, especially considering
areas where sensitive, valuable content is to be outsourced. A good example is a data …

XML access control using static analysis

M Murata, A Tozawa, M Kudo, S Hada - ACM Transactions on …, 2006 - dl.acm.org
Access control policies for XML typically use regular path expressions such as XPath for
specifying the objects for access-control policies. However such access-control policies are …

Specifying and enforcing access control policies for XML document sources

E Bertino, S Castano, E Ferrari, M Mesiti - World Wide Web, 2000 - Springer
The Web is becoming the main information dissemination means in private and public
organizations. As a consequence, several applications at both internet and intranet level …

[PDF][PDF] Query execution assurance for outsourced databases

R Sion - Proceedings of the 31st international conference on …, 2005 - vldb.org
In this paper we propose and analyze a method for proofs of actual query execution in an
outsourced database framework, in which a client outsources its data management needs to …

Aggregation queries in the database-as-a-service model

E Mykletun, G Tsudik - Data and Applications Security XX: 20th Annual …, 2006 - Springer
Abstract In the Database-As-a-Service (DAS) model, clients store their database contents at
servers belonging to potentially untrusted service providers. To maintain data confidentiality …

Regulating access to XML documents

A Gabillon, E Bruno - Database and Application Security XV: IFIP TC11 …, 2002 - Springer
In this paper, our objective is to define a security model for regulating access to XML
documents. Our model offers a security policy with a great expressive power. An XML …

Rights protection for categorical data

R Sion, M Atallah, S Prabhakar - IEEE transactions on …, 2005 - ieeexplore.ieee.org
A novel method of rights protection for categorical data through watermarking is introduced
in this paper. New watermark embedding channels are discovered and associated novel …

A role based access control for web services

R Wonohoesodo, Z Tari - IEEE International Conference …, 2004 - ieeexplore.ieee.org
Web services are vulnerable to various types of security attacks. We address one type of
attacks, where applications trying to access services to which they are not authorized …

Towards secure data outsourcing

R Sion - Handbook of Database Security: Applications and …, 2008 - Springer
The networked and increasingly ubiquitous nature of today's data management services
mandates assurances to detect and deter malicious or faulty behavior. This is particularly …