XML REPOSITORY SEARCHER-BROWSER SUPPORTING FINE-GRAINED ACCESS CONTROL

R. Steele, W. Gardner, and T.S. Dillon

References

  1. [1] W3c-Xml, Extensible markup language (xml), http:// www.W3.Org/xml, 2004.
  2. [2] W. Gardner, E. Chang, & T.S. Dillon, Analysis model of web user interface for web applications, 16th Int. Conf. on Software & Systems Engineering and Their Applications, ICSSEA 2003, France, Paris, 2003, 250–256.
  3. [3] R. Agrawal, N.H. Gehani, & J. Srinivasan, Odeview: The graphical interface to ode, Int. Conf. on Management of Data, Atlantic City, NJ, 1990, 34–43.
  4. [4] S. Dar, N.H. Gehani, H.V. Jagadish, & J. Srinivasan, Queries in an object-oriented graphical interface, Journal of Visual Languages and Computing, 6(1), 1995, 27–52. doi:10.1006/jvlc.1995.1003
  5. [5] M. Carey, L. Haas, V. Maganty, & J. Williams, Pesto: An integrated query/browser for object databases, Int. Conf. on Very Large Databases (VLDB), Mumbai, India, 1996, 203–214.
  6. [6] M. Petropoulos, V. Vassalos, & Y. Papakonstantinou, Xml query forms (xqforms): Declarative specification of xml query interfaces, Int. Conf. on World Wide Web, Hong Kong, 2001, http://www10.org/cdrom/papers/335/index.html.
  7. [7] Y. Papakonstantinou, M. Petropoulos, & V. Vassalos, Qursed: Querying and reporting semistructured data, Int. Conf. on Management of Data, Madison, WI, 2002.
  8. [8] K.D. Munroe & Y. Papakonstantinou, Bbq: A visual interface for integrated browsing and querying of xml, Int. Conf. on Very Large Databases (VLDB), Cairo, 2000.
  9. [9] M. Kudo & S. Hada, Xml document security based on provisional authorization, 7th ACM Conf. on Computer and Communications Security (CCS), Athens, 2000, 87–96. doi:10.1145/352600.352613
  10. [10] E. Bertino, S. Castano, & E. Ferrari, Securing xml documents with author-x, Internet Computing, IEEE, 5(3), 2001, 21–31. doi:10.1109/4236.935172
  11. [11] E. Bertino & E. Ferrari, Secure and selective dissemination of xml documents, ACM Trans. on Information and System Security (TISSEC), 5(3), 2002, 290–331. doi:10.1145/545186.545190
  12. [12] E. Damiani, P. Samarati, S. De Capitani Di Vimercati, & S. Paraboschi, Controlling access to xml documents, Internet Computing, IEEE, 5(6), 2001, 18–28.
  13. [13] E. Damiani, S.D.C.D. Vimercati, S. Paraboschi, & P. Samarati, A fine-grained access control system for xml documents, ACM Trans. on Information and System Security (TISSEC), 5(2), 2002, 169–202. doi:10.1145/505586.505590
  14. [14] A. Gabillon & E. Bruno, Regulating access to xml documents, 15th Annual Conf. on Database Security, Niagara, Ontario, Canada, 2001, 299–314.
  15. [15] Oasis, Extensible access control markup language (xacml) version 1.0, 2003 [cited 30 May 2004], http://www.oasis-open.org/ committees/tc_home.php?wg_ abbrev=xacml.
  16. [16] W3c-Xpath, Xml path language (xpath) version 1.0, http://www.W3.Org/tr/xpath, 1999.
  17. [17] W3c-Xsl, Extensible stylesheet language (xsl), http:// www.W3.Org/style/xsl, 2003.
  18. [18] S.K. Goel, C. Clifton, & A. Rosenthal, Derived access control specification for xml, Workshop on XML Security, Fairfax, VA, 2003, 1–14. doi:10.1145/968559.968561
  19. [19] W3c-Xquery, Xquery 1.0: An xml query language, http:// www.W3.Org/tr/xquery, 2004.
  20. [20] G. Miklau & D. Suciu, Controlling access to published data using cryptography, Proc. of the 29th VLDB Conf., Berlin, Germany, 2003.
  21. [21] F. Wenfei, C. Chee-Yong, & G. Minos, Secure xml querying with security views, SIGMOD, Paris, 2004, 587–598.
  22. [22] R. Steele, Y. Ventsov, & T. Dillon, Object-oriented databasebased architecture for mobile enterprise applications, IEEE ITCC04, Las Vegas, 2004, 586.
  23. [23] R. Steele, Y. Ventsov, & T. Dillon, Xml schema-based discovery and invocation of mobile services, IEEE EEE04, Taipei, 2004, 253–258.
  24. [24] R. Steele & T. Dillon, Ontology driven system for mobile device access of electronic health records, Proc. of 3rd Int. Conf. of Mobile Business 04, New York, US, July 12–13, 2004.

Important Links:

Go Back