{"id":"https://openalex.org/W2060916782","doi":"https://doi.org/10.1145/1178618.1178621","title":"XML access control using static analysis","display_name":"XML access control using static analysis","publication_year":2006,"publication_date":"2006-08-01","ids":{"openalex":"https://openalex.org/W2060916782","doi":"https://doi.org/10.1145/1178618.1178621","mag":"2060916782"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178621","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://pdf.aminer.org/001/103/644/xml_access_control_using_static_analysis.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101548324","display_name":"Makoto Murata","orcid":"https://orcid.org/0000-0003-1073-2582"},"institutions":[{"id":"https://openalex.org/I4210145865","display_name":"IBM Research - Tokyo","ror":"https://ror.org/04915qk43","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145865"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Makoto Murata","raw_affiliation_strings":["IBM Tokyo Research Lab, Kanagawa-ken, Japan"],"affiliations":[{"raw_affiliation_string":"IBM Tokyo Research Lab, Kanagawa-ken, Japan","institution_ids":["https://openalex.org/I4210145865"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079481895","display_name":"Akihiko Tozawa","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145865","display_name":"IBM Research - Tokyo","ror":"https://ror.org/04915qk43","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145865"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Akihiko Tozawa","raw_affiliation_strings":["IBM Tokyo Research Lab, Kanagawa-ken, Japan"],"affiliations":[{"raw_affiliation_string":"IBM Tokyo Research Lab, Kanagawa-ken, Japan","institution_ids":["https://openalex.org/I4210145865"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103203636","display_name":"Michiharu Kudo","orcid":"https://orcid.org/0000-0003-1575-6305"},"institutions":[{"id":"https://openalex.org/I4210145865","display_name":"IBM Research - Tokyo","ror":"https://ror.org/04915qk43","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145865"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Michiharu Kudo","raw_affiliation_strings":["IBM Tokyo Research Lab, Kanagawa-ken, Japan"],"affiliations":[{"raw_affiliation_string":"IBM Tokyo Research Lab, Kanagawa-ken, Japan","institution_ids":["https://openalex.org/I4210145865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5063047804","display_name":"Satoshi Hada","orcid":null},"institutions":[{"id":"https://openalex.org/I4210145865","display_name":"IBM Research - Tokyo","ror":"https://ror.org/04915qk43","country_code":"JP","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210145865"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Satoshi Hada","raw_affiliation_strings":["IBM Tokyo Research Lab, Kanagawa-ken, Japan"],"affiliations":[{"raw_affiliation_string":"IBM Tokyo Research Lab, Kanagawa-ken, Japan","institution_ids":["https://openalex.org/I4210145865"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":19.574,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":75,"citation_normalized_percentile":{"value":0.959469,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":"9","issue":"3","first_page":"292","last_page":"324"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9964,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/xpath","display_name":"XPath","score":0.9419309},{"id":"https://openalex.org/keywords/xml-schema","display_name":"XML Schema (W3C)","score":0.48829532},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.45715186},{"id":"https://openalex.org/keywords/path-expression","display_name":"Path expression","score":0.43065447}],"concepts":[{"id":"https://openalex.org/C2780213375","wikidata":"https://www.wikidata.org/wiki/Q16340","display_name":"XPath","level":4,"score":0.9419309},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8938563},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.71470463},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5914087},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.53189445},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.49303028},{"id":"https://openalex.org/C40713593","wikidata":"https://www.wikidata.org/wiki/Q16342","display_name":"XML Schema (W3C)","level":5,"score":0.48829532},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.45715186},{"id":"https://openalex.org/C61114434","wikidata":"https://www.wikidata.org/wiki/Q7144649","display_name":"Path expression","level":3,"score":0.43065447},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.40719},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3464843},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.34407014},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.30204278},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.20052388},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17480981},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.15834206}],"mesh":[],"locations_count":2,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/1178618.1178621","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.543.2824","pdf_url":"http://pdf.aminer.org/001/103/644/xml_access_control_using_static_analysis.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.543.2824","pdf_url":"http://pdf.aminer.org/001/103/644/xml_access_control_using_static_analysis.pdf","source":{"id":"https://openalex.org/S4306400349","display_name":"CiteSeer X (The Pennsylvania State University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I130769515","host_organization_name":"Pennsylvania State University","host_organization_lineage":["https://openalex.org/I130769515"],"host_organization_lineage_names":["Pennsylvania State University"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false},"sustainable_development_goals":[{"score":0.59,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":44,"referenced_works":["https://openalex.org/W1483186839","https://openalex.org/W1528222021","https://openalex.org/W1538487881","https://openalex.org/W1540516609","https://openalex.org/W1544585257","https://openalex.org/W1547011845","https://openalex.org/W1548569630","https://openalex.org/W1591926286","https://openalex.org/W1593799327","https://openalex.org/W1664954303","https://openalex.org/W167362928","https://openalex.org/W17003643","https://openalex.org/W1716100575","https://openalex.org/W1749554492","https://openalex.org/W1778385122","https://openalex.org/W1912713675","https://openalex.org/W1965014786","https://openalex.org/W1966814918","https://openalex.org/W1988662949","https://openalex.org/W2002089154","https://openalex.org/W2029970296","https://openalex.org/W2033176822","https://openalex.org/W2039588269","https://openalex.org/W2052932288","https://openalex.org/W2073300799","https://openalex.org/W2091712649","https://openalex.org/W2105748890","https://openalex.org/W2107683037","https://openalex.org/W2108891217","https://openalex.org/W2110459974","https://openalex.org/W2112647999","https://openalex.org/W2122239376","https://openalex.org/W2122493035","https://openalex.org/W2133278242","https://openalex.org/W2134170665","https://openalex.org/W2158903380","https://openalex.org/W2164549836","https://openalex.org/W2258030721","https://openalex.org/W2500135585","https://openalex.org/W261652732","https://openalex.org/W2915063781","https://openalex.org/W421997344","https://openalex.org/W4244225911","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2379906703","https://openalex.org/W2180299897","https://openalex.org/W2152532227","https://openalex.org/W2146310406","https://openalex.org/W2130031739","https://openalex.org/W2119144256","https://openalex.org/W2060916782","https://openalex.org/W2018245989","https://openalex.org/W1652633386","https://openalex.org/W1539026587"],"abstract_inverted_index":{"Access":[0],"control":[1],"policies":[2,23,145],"for":[3,13,17,30,41,141],"XML":[4,31,42,93],"typically":[5],"use":[6],"regular":[7],"path":[8],"expressions":[9,124],"such":[10,21],"as":[11],"XPath":[12],"specifying":[14],"the":[15,27,73,79],"objects":[16],"access-control":[18,22,46,74,144],"policies.":[19],"However":[20],"are":[24,70],"burdens":[25],"to":[26,64,105,108,130],"query":[28,48,59,89,121],"engines":[29],"documents.":[32,94],"To":[33],"relieve":[34],"this":[35,58],"burden,":[36],"we":[37],"introduce":[38,147],"static":[39,54,101,118,139],"analysis":[40,55,82,102,119,140],"access-control.":[43],"Given":[44],"an":[45,51],"policy,":[47],"expression,":[49],"and":[50,146],"optional":[52],"schema,":[53],"determines":[56],"if":[57],"expression":[60,90],"is":[61,97,103,120],"guaranteed":[62],"not":[63],"access":[65,112],"elements":[66],"or":[67,110],"attributes":[68],"that":[69],"hidden":[71],"by":[72,78],"policy":[75],"but":[76],"permitted":[77],"schema.":[80],"Static":[81],"can":[83,127],"be":[84,128],"performed":[85],"without":[86],"evaluating":[87],"any":[88],"against":[91],"actual":[92],"Run-time":[95],"checking":[96],"required":[98],"only":[99],"when":[100],"unable":[104],"determine":[106],"whether":[107],"grant":[109],"deny":[111],"requests.":[113],"A":[114],"side":[115],"effect":[116],"of":[117],"optimization:":[122],"access-denied":[123],"in":[125],"queries":[126],"evaluated":[129],"empty":[131],"lists":[132],"at":[133],"compile":[134],"time.":[135],"We":[136],"further":[137],"extend":[138],"handling":[142],"value-based":[143],"view":[148],"schemas.":[149]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2060916782","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":9},{"year":2012,"cited_by_count":6}],"updated_date":"2024-12-07T20:38:48.643760","created_date":"2016-06-24"}