Skip to Main Content
In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database (3) Data are stored in relational databases, and (4) Security check and query evaluation are also done in relational databases.
Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference on (Volume:2 )
Date of Conference: 13-15 Dec. 2008