Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Secure XML querying based on authorization graphs
by
Chebotko, Artem
, Chang, Seunghan
, Fotouhi, Farshad
, Lu, Shiyong
in
Acceptability
/ Access
/ Access control
/ Algorithms
/ Analysis
/ Authorization
/ Authorizations
/ Business and Management
/ Computer science
/ Control
/ Documents
/ Extensible Markup Language
/ Graphs
/ Indexes
/ Information systems
/ Internet
/ IT in Business
/ Management of Computing and Information Systems
/ Multimedia
/ Network security
/ Operations Research/Decision Theory
/ Optimization
/ Optimization techniques
/ Queries
/ Query processing
/ Recursion
/ Recursive
/ Security
/ Studies
/ Systems Theory
/ XML
2012
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Secure XML querying based on authorization graphs
by
Chebotko, Artem
, Chang, Seunghan
, Fotouhi, Farshad
, Lu, Shiyong
in
Acceptability
/ Access
/ Access control
/ Algorithms
/ Analysis
/ Authorization
/ Authorizations
/ Business and Management
/ Computer science
/ Control
/ Documents
/ Extensible Markup Language
/ Graphs
/ Indexes
/ Information systems
/ Internet
/ IT in Business
/ Management of Computing and Information Systems
/ Multimedia
/ Network security
/ Operations Research/Decision Theory
/ Optimization
/ Optimization techniques
/ Queries
/ Query processing
/ Recursion
/ Recursive
/ Security
/ Studies
/ Systems Theory
/ XML
2012
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Secure XML querying based on authorization graphs
by
Chebotko, Artem
, Chang, Seunghan
, Fotouhi, Farshad
, Lu, Shiyong
in
Acceptability
/ Access
/ Access control
/ Algorithms
/ Analysis
/ Authorization
/ Authorizations
/ Business and Management
/ Computer science
/ Control
/ Documents
/ Extensible Markup Language
/ Graphs
/ Indexes
/ Information systems
/ Internet
/ IT in Business
/ Management of Computing and Information Systems
/ Multimedia
/ Network security
/ Operations Research/Decision Theory
/ Optimization
/ Optimization techniques
/ Queries
/ Query processing
/ Recursion
/ Recursive
/ Security
/ Studies
/ Systems Theory
/ XML
2012
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Secure XML querying based on authorization graphs
2012
Request Book From Autostore
and Choose the Collection Method
Overview
XML is rapidly emerging as a standard for data representation and exchange over the World Wide Web and an increasing amount of sensitive business data is processed in XML format. Therefore, it is critical to have control mechanisms to restrict a user to access only the parts of XML documents that she is authorized to access. In this paper, we propose the first DTD-based access control model that employs graph matching to analyze if an input query is fully acceptable, fully rejectable, or partially acceptable. In this way, there will be no further security overhead for the processing of fully acceptable and rejectable queries. For partially acceptable queries, we propose a graph-matching based authorization model for an optimized rewriting procedure in which a recursive query (query with descendant axis ‘//’) will be rewritten into an equivalent recursive one if possible and into a non-recursive one only if necessary, resulting queries that can fully take advantage of structural join based query optimization techniques. Moreover, we propose an index structure for XML element types to speed up the query rewriting procedure, a facility that is potentially useful for applications with large DTDs. Our performance study results showed that our algorithms armed with rewriting indexes are promising.
This website uses cookies to ensure you get the best experience on our website.