Developing a Dynamic Trust-Based Access Control Model for XML Databases.

[1]  Elisa Bertino,et al.  Privacy Protection , 2022 .

[2]  Erik T. Ray,et al.  Learning XML , 2001 .

[3]  E. Damiani,et al.  New paradigms for access control in open environments , 2005, Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005..

[4]  Sarbjeet Singh Trust Based Authorization Framework for Grid Services , 2011 .

[5]  Seog Park,et al.  New Access Control for Secure Query Processing over XML Data Stream , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[6]  W. Glas Xml and Databases , 2002 .

[7]  Ernesto Damiani,et al.  XML Security , 2007, Security, Privacy, and Trust in Modern Data Management.

[8]  Paolo Atzeni,et al.  XML AND DATABASES , 2004 .

[9]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[10]  Yuqing Wu,et al.  Access control for XML: a dynamic query rewriting approach , 2005, CIKM '05.

[11]  Ruonan Rao,et al.  Trust Based Access Control Framework for R-OSGi , 2010, 2010 2nd International Workshop on Database Technology and Applications.

[12]  J. Wenny Rahayu,et al.  Privacy-aware access control in XML databases , 2010, ADC.

[13]  Sabrina De Capitani di Vimercati,et al.  Access Control Models for XML , 2008, Handbook of Database Security.

[14]  Ernesto Damiani,et al.  Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.

[15]  Junshan Li,et al.  A Trust and Context Based Access Control Model for Distributed Systems , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[16]  Zahid Anwar,et al.  TRDBAC: Temporal reflective database access control , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[17]  Joon S. Park,et al.  Role-based profile analysis for scalable and accurate insider-anomaly detection , 2006, 2006 IEEE International Performance Computing and Communications Conference.

[18]  Yonggwan Won,et al.  A Flexible Database Security System Using Multiple Access Control Policies , 2003, DEXA.

[19]  Yanchun Zhang,et al.  An Integrated Access Control for Securely Querying and Updating XML Data , 2008, ADC.

[20]  Aye Sandar Myint High performance and scalable client-based access control model for XML databases , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).

[21]  Ernesto Damiani,et al.  A general approach to securely querying XML , 2008, Comput. Stand. Interfaces.

[22]  Haicheng Xu,et al.  A dynamic Access Control model based on trust , 2010, 2010 The 2nd Conference on Environmental Science and Information Application Technology.

[23]  Zhiyong Feng,et al.  A Trust-Based Access Control with Feedback , 2008, 2008 International Symposiums on Information Processing.

[24]  Joon S. Park,et al.  A composite rbac approach for large, complex organizations , 2004, SACMAT '04.

[25]  Barbara Catania,et al.  XML Data Stores: Emerging Practices , 2005, IEEE Internet Comput..

[26]  Stephen Hailes,et al.  A Distributed Trust Model (extended abstract) , 1997 .

[27]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.

[28]  Sriram Mohan,et al.  A Framework for Access Control for XML , 2022 .

[29]  Laks V. S. Lakshmanan,et al.  Compressed Accessibility Map: Efficient Access Control for XML , 2002, VLDB.

[30]  Ji Ma,et al.  Risk Analysis in Access Control Systems Based on Trust Theories , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[31]  Masatoshi Yoshikawa,et al.  A Study on Efficient Access Control for XML Ducuments , 2005, ICDE Workshops.

[32]  Li Zhou,et al.  Adaptive trust negotiation and access control , 2005, SACMAT '05.

[33]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[34]  Alban Gabillon An authorization model for XML databases , 2004, SWS '04.

[35]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[36]  Yi Hu,et al.  Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[37]  Hua Wang,et al.  A Purpose Based Access Control in XML Databases System , 2010, 2010 Fourth International Conference on Network and System Security.

[38]  Yuqing Wu,et al.  ACXESS - Access Control for XML with Enhanced Security Specifications , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[39]  Fei Li,et al.  A bitmap indexing scheme for temporal access control to XML documents , 2008, 2008 IEEE International Symposium on IT in Medicine and Education.

[40]  Dongwon Lee,et al.  Comparative analysis of six XML schema languages , 2000, SGMD.

[41]  Michael Collins,et al.  Evaluating Trust-Based Access Control for Social Interaction , 2009, 2009 Third International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies.

[42]  Laks V. S. Lakshmanan,et al.  A compressed accessibility map for XML , 2004, TODS.

[43]  Vijay Varadharajan,et al.  A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[44]  Erik Vullings,et al.  A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[45]  Maggie Duong Access control model and labelling scheme for efficient querying and updating XML data , 2010 .

[46]  Vijay Varadharajan,et al.  RBAC for XML Document Stores , 2001, ICICS.

[47]  Seog Park,et al.  Efficient access control labeling scheme for secure XML query processing , 2011, Comput. Stand. Interfaces.

[48]  Sylvia L. Osborn,et al.  A role-based approach to access control for XML databases , 2004, SACMAT '04.

[49]  Sun-Moon Jo,et al.  Access control model for secure XML documents , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).

[50]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[51]  Hong Zhu,et al.  A flexible mandatory access control policy for XML databases , 2007 .

[52]  José A. Pino,et al.  Access control mechanism for collaborative video database production applications , 2004, IEEE Sixth International Symposium on Multimedia Software Engineering.

[53]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[54]  Seog Park,et al.  A Schema Based Approach to Valid XML Access Control , 2010, J. Inf. Sci. Eng..

[55]  Sabrina De Capitani di Vimercati,et al.  An access control model for querying XML data , 2005, SWS '05.

[56]  Yuqing Wu,et al.  A Rewrite Based Approach for Enforcing Access Constraints for XML , 2007, KES.

[57]  Jussi Myllymaki,et al.  A function-based access control model for XML databases , 2005, CIKM '05.

[58]  Alban Gabillon A Formal Access Control Model for XML Databases , 2005, Secure Data Management.

[59]  Blake Dournaee,et al.  XML Security , 2002 .

[60]  Dan Suciu,et al.  Data on the Web: From Relations to Semistructured Data and XML , 1999 .

[61]  Wang Yu,et al.  An mixed access control method based on trust and role , 2012 .

[62]  Sayyed Kamyar Izadi,et al.  XPLC: A Novel Protocol for Concurrency Control in XML Databases , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.

[63]  Ernesto Damiani,et al.  Controlling Access to XML Documents , 2001, IEEE Internet Comput..