Show simple item record

dc.contributor.authorBöttcher, Stefan
dc.contributor.authorSteinmetz, Rita
dc.contributor.editorVossen, Gottfried
dc.contributor.editorLeymann, Frank
dc.contributor.editorLockemann, Peter
dc.contributor.editorStucky, Wolffried
dc.date.accessioned2019-10-11T08:35:12Z
dc.date.available2019-10-11T08:35:12Z
dc.date.issued2005
dc.identifier.isbn3-88579-394-6
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/28271
dc.description.abstractAccess control is an important aspect in guaranteeing data privacy within XML data sources which are accessed by users with different access rights. The goal of predicative access control for XML data sources is to use XPath expressions to describe that fragment of a given document or database that can be accessed by queries of a certain user. Our approach to access control hides the XML data source within an access control module which implements a combination of two secure query execution plans. The first query execution plan works on copied secure fragments, whereas the second query execution plan transforms a given query into another query that respects all the access rights. For each query the appropriate secure execution plan is determined depending on the query and the user's access rights.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofDatenbanksysteme in Business, Technologie und Web, 11. Fachtagung des GIFachbereichs “Datenbanken und Informationssysteme” (DBIS)
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-65
dc.titleAdaptive XML access control based on query nesting, modification and simplificationen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages295-304
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationKarlsruhe
mci.conference.date2.-4. März 2005


Files in this item

Thumbnail

Show simple item record