{"id":"https://openalex.org/W1985019380","doi":"https://doi.org/10.1108/17440080911006216","title":"Schema\u2010level access control policies for XML documents","display_name":"Schema\u2010level access control policies for XML documents","publication_year":2009,"publication_date":"2009-11-20","ids":{"openalex":"https://openalex.org/W1985019380","doi":"https://doi.org/10.1108/17440080911006216","mag":"1985019380"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/17440080911006216","pdf_url":null,"source":{"id":"https://openalex.org/S145159096","display_name":"International Journal of Web Information Systems","issn_l":"1744-0084","issn":["1744-0084","1744-0092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110101120","display_name":"Tomasz M\u00fcldner","orcid":null},"institutions":[{"id":"https://openalex.org/I92688161","display_name":"Acadia University","ror":"https://ror.org/00839we02","country_code":"CA","type":"education","lineage":["https://openalex.org/I92688161"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Tomasz M\u00fcldner","raw_affiliation_strings":["Jodrey School of Computer Science, Acadia University, Wolfville, Canada"],"affiliations":[{"raw_affiliation_string":"Jodrey School of Computer Science, Acadia University, Wolfville, Canada","institution_ids":["https://openalex.org/I92688161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004916053","display_name":"Gregory Leighton","orcid":null},"institutions":[{"id":"https://openalex.org/I154425047","display_name":"University of Alberta","ror":"https://ror.org/0160cpw27","country_code":"CA","type":"education","lineage":["https://openalex.org/I154425047"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Gregory Leighton","raw_affiliation_strings":["Department of Computing Science, University of Alberta, Edmonton, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computing Science, University of Alberta, Edmonton, Canada","institution_ids":["https://openalex.org/I154425047"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059229415","display_name":"Jan Krzysztof Mizio\u0142ek","orcid":null},"institutions":[{"id":"https://openalex.org/I4654613","display_name":"University of Warsaw","ror":"https://ror.org/039bjqg32","country_code":"PL","type":"education","lineage":["https://openalex.org/I4654613"]}],"countries":["PL"],"is_corresponding":false,"raw_author_name":"Jan Krzysztof Mizio\u0142ek","raw_affiliation_strings":["Computing Services Centre for Studies on the Classical Tradition in Poland and East\u2010Central Europe, University of Warsaw, Warsaw, Poland"],"affiliations":[{"raw_affiliation_string":"Computing Services Centre for Studies on the Classical Tradition in Poland and East\u2010Central Europe, University of Warsaw, Warsaw, Poland","institution_ids":["https://openalex.org/I4654613"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":64},"biblio":{"volume":"5","issue":"4","first_page":"465","last_page":"494"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.45558247}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8949803},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6501539},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6011537},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.5735345},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5624802},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5319199},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.46465865},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.45558247},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.35752985},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34464827},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.31094667},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30103928},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.28866798},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16080269}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1108/17440080911006216","pdf_url":null,"source":{"id":"https://openalex.org/S145159096","display_name":"International Journal of Web Information Systems","issn_l":"1744-0084","issn":["1744-0084","1744-0092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions","score":0.48}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":28,"referenced_works":["https://openalex.org/W1499220070","https://openalex.org/W1570880505","https://openalex.org/W1604604413","https://openalex.org/W1965014786","https://openalex.org/W2024987747","https://openalex.org/W2059962894","https://openalex.org/W2079799821","https://openalex.org/W2089507241","https://openalex.org/W2091712649","https://openalex.org/W2094079142","https://openalex.org/W2095417143","https://openalex.org/W2095742218","https://openalex.org/W2097209658","https://openalex.org/W2102458890","https://openalex.org/W2105748890","https://openalex.org/W2107307934","https://openalex.org/W2120588620","https://openalex.org/W2135565076","https://openalex.org/W2143942114","https://openalex.org/W2154765153","https://openalex.org/W2156560889","https://openalex.org/W2161006460","https://openalex.org/W2167896190","https://openalex.org/W2239537406","https://openalex.org/W2405269923","https://openalex.org/W2914098457","https://openalex.org/W3021132897","https://openalex.org/W39935695"],"related_works":["https://openalex.org/W4283160672","https://openalex.org/W4247536566","https://openalex.org/W4241418540","https://openalex.org/W3119814709","https://openalex.org/W2725786787","https://openalex.org/W2404647514","https://openalex.org/W2018477250","https://openalex.org/W1667647204","https://openalex.org/W1590965489","https://openalex.org/W1508895727"],"abstract_inverted_index":{"Purpose":[0],"The":[1,120,136,221,236],"purpose":[2],"of":[3,12,19,64,77,128,141,152,158,169,175,181,191,199,273],"this":[4,192],"paper":[5,103,137,267],"is":[6,23,33,96,206,244,247],"to":[7,132,249,256,261,269],"consider":[8],"the":[9,60,65,75,139,142,150,167,170,173,176,182,241,270],"secure":[10,274],"publishing":[11],"XML":[13,21,253,275],"documents,":[14],"where":[15],"a":[16,26,40,87,118,125,202,257],"single":[17],"copy":[18],"an":[20],"document":[22,178],"disseminated":[24],"and":[25,53,111,116,145,160,179,196,232,246],"stated":[27],"role\u2010based":[28],"access":[29],"control":[30],"policy":[31,51],"(RBACP)":[32],"enforced":[34],"via":[35],"selective":[36],"encryption.":[37],"It":[38,164],"describes":[39,86,104],"more":[41,210],"efficient":[42,271],"solution":[43,121,223],"over":[44,154],"previously":[45],"proposed":[46,242],"approaches,":[47],"in":[48,70,74,124,156,216,251],"which":[49,71,252],"both":[50],"specification":[52],"key":[54,109],"generation":[55,110],"are":[56,80,185,219,229,260],"performed":[57],"once,":[58],"at":[59,98],"schema\u2010level.":[61],"In":[62,208],"lieu":[63],"commonly":[66],"used":[67],"super\u2010encryption":[68],"technique,":[69],"nodes":[72],"residing":[73],"intersection":[76],"multiple":[78,83],"roles":[79],"encrypted":[81,97],"with":[82],"keys,":[84],"it":[85],"new":[88],"approach":[89,171,243],"called":[90],"multi\u2010encryption":[91,153],"that":[92,240],"guarantees":[93],"each":[94,133],"node":[95],"most":[99],"once.":[100],"Design/methodology/approach":[101],"This":[102,266],"two":[105],"alternative":[106],"algorithms":[107,113],"for":[108,114,213],"single\u2010pass":[112],"multi\u2010encrypting":[115],"decrypting":[117],"document.":[119],"typically":[122],"results":[123,148,238],"smaller":[126],"number":[127],"keys":[129],"being":[130],"distributed":[131],"user.":[134],"Findings":[135],"proves":[138],"correctness":[140],"presented":[143],"algorithms,":[144],"provides":[146],"experimental":[147,237],"indicating":[149],"superiority":[151],"super\u2010encryption,":[155],"terms":[157],"encryption":[159],"decryption":[161],"time":[162],"requirements.":[163],"also":[165],"demonstrates":[166],"scalability":[168],"as":[172],"size":[174],"input":[177],"complexity":[180],"schema\u2010level":[183],"RBACP":[184],"increased.":[186],"Research":[187],"limitations/implications":[188],"An":[189],"extension":[190],"work":[193],"involves":[194],"designing":[195],"implementing":[197],"re\u2010usability":[198],"keyrings":[200],"when":[201,226],"schema":[203,217,227,259],"or":[204],"ACP":[205],"modified.":[207],"addition,":[209],"flexible":[211],"solutions":[212],"handling":[214],"cycles":[215],"graphs":[218,228],"possible.":[220],"current":[222],"encounters":[224],"difficulty":[225],"particularly":[230],"deep":[231],"broad.":[233],"Practical":[234],"implications":[235],"indicate":[239],"scalable,":[245],"applicable":[248],"scenarios":[250],"documents":[254],"conforming":[255],"common":[258],"be":[262],"securely":[263],"published.":[264],"Originality/value":[265],"contributes":[268],"implementation":[272],"publication":[276],"systems.":[277]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1985019380","counts_by_year":[],"updated_date":"2024-12-10T00:53:31.315908","created_date":"2016-06-24"}