ACCOn: Checking Consistency of XML Write-Access Control Policies
Proceedings of the 11th International Conference on Extending Database Technology (EDBT 2008)
dc.contributor.author | Loreto Bravo | en |
dc.contributor.author | James Cheney | en |
dc.contributor.author | Irini Fundulaki | en |
dc.date.accessioned | 2011-01-17T14:00:02Z | |
dc.date.available | 2011-01-17T14:00:02Z | |
dc.date.issued | 2008 | |
dc.identifier.isbn | 978-1-59593-926-5 | |
dc.identifier.uri | http://portal.acm.org/citation.cfm?doid=1353343.1353433 | |
dc.identifier.uri | http://hdl.handle.net/1842/4596 | |
dc.description.abstract | XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. ACCOn implements i) consistency checking algorithms that examine whether a write-access control policy defined over a DTD is inconsistent and ii) repair algorithms that propose repairs to an inconsistent policy to obtain a consistent one. | en |
dc.language.iso | en | |
dc.title | ACCOn: Checking Consistency of XML Write-Access Control Policies | en |
dc.type | Conference Paper | en |
dc.identifier.doi | 10.1145/1353343.1353433 | |
rps.title | Proceedings of the 11th International Conference on Extending Database Technology (EDBT 2008) | en |
dc.extent.noOfPages | 715-719 | en |
dc.date.updated | 2011-01-17T14:00:02Z | |
dc.date.openingDate | 2008-03-25 | |
dc.date.closingDate | 2008-03-30 |