Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Martin Abadi and Bogdan Warinschi. Security analysis of cryptographically controlled access to xml documents. Symposium on Principles of Database Systems(PODS), 2005.
Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwaihara, and Yahiko Kambayashi Vilas Wuwongse. A rule-based xml access control model. International Conference on Rules and Rule Markup Languages for the Semantic Web(RuleML), 2003.
Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Authorx: A java-based system for xml data protection. IFIP Working Conf. Database Security, 2000.
Elisa Bertino, Silvana Castano, and Elena Ferrari. On specifying security policies for web documents with an xml-based language. ACM Symposium on Access Control Models and Technologies (SACMAT), 2001.
Elisa Bertino, Silvana Castano, and Elena Ferrari. Securing xml documents with author-x. IEEE Internet Computing, 2001.
Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Controlled access and dissemination of xml documents. Workshop on Web Information and Data Management, 1999.
Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Specifying and enforcing access control policies for xml document sources. World Wide Web Journal, 2000.
Elisa Bertino and Elena Ferrari. Secure and selective dissemination of xml documents. ACM Transactions on Information and System Security (TISSEC), 2002.
Biomedical database, http://www.cs.washington.edu/-research/xmldatasets/www/repository.html.
Luc Bouganim, Francois Dang Ngoc, and Philippe Pucheral. Client-based access control management for xml documents. Very Large Database (VLDB), 2004.
SungRan Cho, Sihem Amer-Yahia, Laks V. S. Lakshmanan, and Divesh Srivastava. Optimizing the secure evaluation of twig queries. Very Large Database (VLDB), 2002.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Design and implementation of an access control processor for xml documents. Computer Networks, 2000.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Securing xml documents. International Conference on Extending Database Technology(EDBT), 2000.
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Xml access control systems: A component-based approach. Informatica, 2002.
Wenfei Fan, Chee Yong Chan, and Minos N. Garofalakis. Secure xml querying with security views. Special Interest Group on Management of Data(SIGMOD), 2004.
Irini Fundulaki and Maarten Marx. Specifying access control policies for xml documents with xpath. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.
Abhilash Gummadi, Jong P. Yoon, Biren Shah, and Vijay Raghavan. A bitmap-based access control for restricted views of xml documents. ACM Workshop on XML Security, 2003.
IBM XML generator, http://www.alphaworks.ibm.com/tech/xmlgenerator.
Michiharu Kudo and Satoshi Hada. Xml document security based on provisional authorization. ACM Conf. Computer and Communications Security, 2000.
Gabriel Kuper, Fabio Massacci, and Nataliya Rassadko. Generalized xml security views. ACM Symposium on Access Control Models and Technologies (SACMAT), 2005.
Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. Qfilter: Fine-grained run-time xml access control via nfa-based query rewriting. Conference on Information and Knowledge Management(CIKM), 2004.
Gerome Miklau and Dan Suciu. Containment and equivalence for an xpath fragment. Symposium on Principles of Database Systems(PODS), 2002.
Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. Very Large Database (VLDB), 2003.
Makoto Murata, Akihiko Tozawa, and Michiharu Kudo. Xml access control using static analysis. ACM Conference on Computer and Communications Security (CCS), 2003.
United States Government Bills, http://xml.house.gov.
Hui Wang, Divesh Srivastava, Laks V.S. Lakshmanan, SungRan Cho, and Sihem Amer-Yahia. Optimizing tree pattern queries over secure xml databases: Full paper. http://www.cs.ubc.ca/~hwang/accesscontrol/proof.pdf, 2005.
Jingzhu Wang and Sylvia L. Osborn. A role-based approach to access control for xml databases. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.
Peter Wood. Containment for xpath fragments under dtd constraints. International Conference on Database Theory(ICDT), 2003.
XALAN, http://xml.apache.org.
XMark, http://monetdb.cwi.nl/xml/.
Ting Yu, Divesh Srivastava, Laks V.S. Lakshmanan, and H. V. Jagadish. A compressed accessibility map for xml. ACM Transactions on Database Systems, 2004.
Huaxin Zhang, Ning Zhang, Kenneth Salem, and Donghui Zhuo. Compact access control labeling for efficient secure xml query evaluation. International Workshop on XML Schema and Data Management(XSDM), 2005.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Wang, H., Srivastava, D., Lakshmanan, L.V.S., Cho, S., Amer-Yahia, S. (2007). Optimizing Tree Pattern Queries over Secure XML Databases. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_5
Download citation
DOI: https://doi.org/10.1007/978-0-387-27696-0_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-27694-6
Online ISBN: 978-0-387-27696-0
eBook Packages: Computer ScienceComputer Science (R0)