1 |
A. Berglund, S. Boag, D. Chamberlin, M. F. Fernandez, M. Kay, J. Robie, and J. Simeon. XPath 2.0, World Wide Web Consortium (W3C), 2007, (http://www.w3.org/TH/xpath20/)
|
2 |
E. Damiani, S. Virnercati, S. Paraboachk and P. Samarati, A Fine-grained Access Control System for XML Documents. ACM Trans. Information and System Sec., Vol.5, No.2, pp. 169-202, May 2002
DOI
|
3 |
M. Murata, A. Tozawa, and M. Kudo, 'XML Access Control using Static Analysis' ACM CCS, Washington D.C., pp. 73-84, 2003
DOI
|
4 |
W. Fan, F. Geerts, X. Jia and A. Kementsietsidis, 'Rewriting Regular XPath Queries on XML views,' ICDE, pp. 666-675, 2007
DOI
|
5 |
L. Bouganim, F. D. Ngoc, and P. Pucheral, 'Clientbased access control management for XML documents,' VLDB, pp. 84-95, 2004
|
6 |
A. R. Schmidt, F. Waas, M. L. Kersten, D. Florescu, I. Manolescu, M. J. Carey, and R. Busse. The XML Benchmark Project. Technical Report INS-R0103, CWI, April 2001
|
7 |
F. Rabitti, E. Bertino, W. Kim and D. Woelk. A Model of Authorization for Next-Generation Database Systems. ACM Transaction on Database Systems, 126(1), pp. 88-131, March 1991
DOI
|
8 |
C. Byun and S. Park, 'Two Phase Filtering for XML Access Control,' VLDB Workshop on SDM'06, pp. 115-130, 2006
DOI
ScienceOn
|
9 |
T. Bray, .J. Paoli, C. M. Sperberg-McQueen, E. Maler, F. Yergeau. eXtensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C), 2004
|
10 |
Jae-Myeong Jeon, Yon Dohn Chung, Myoung Ho Kim, and Yoon joon Lee, Filtering XPath expressions for XML access control. Computers & Security, pp. 591-605, 2004
DOI
ScienceOn
|
11 |
E. Bertino, S. Castano, E. Ferrari, and Mv Mesiti. Specifying and Enforcing Access Control Policies for XM.L Document Sources. WWW Journal, Vol.3, No.3, pp. 139-151, 2000
DOI
|
12 |
B. Luo, D. W. Lee, W. C. Lee, and P. Liu, 'Qfilter: Fine-grained Run-Time XML Access Control via NFA-based Query Rewriting,' CIKM'04, pp. 543-552, 2004
DOI
|
13 |
W. Fan, C. Y. Chan, and M. Garofalakis, 'SMOQE: A system for providing secure access to XML,' VLDB, pp. 1227-1230, 2006
|
14 |
E. Damiani, S. Vimercati, S. Paraboachk and P. Samarati. Design and Implementation of Access Control Processor for XML Documents. Computer Network, pp. 59-75, 2000
DOI
ScienceOn
|
15 |
E. Bertino, S. Castano, and E. Ferrai. Securing XML documents with Author-x. IEEE Internet Computing, May. June, pp. 21-31, 2001
DOI
ScienceOn
|
16 |
W. Lindner and J. Meier. 'Towards a Secure Data Stream Management System,' VLDB Workshop TEAA 2006
DOI
ScienceOn
|