References

  1. Serge Abiteboul, Luc Segoufin & Victor Vianu (2006): Representing and querying XML with incomplete information. ACM Trans. Database Syst. 31(1), pp. 208–254, doi:10.1145/1132863.1132869.
  2. Noga Alon, Tova Milo, Frank Neven, Dan Suciu & Victor Vianu (2001): XML with data values: typechecking revisited. In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, PODS '01. ACM, pp. 138–149, doi:10.1145/375551.375570.
  3. Mikoaj Bojańczyk, Anca Muscholl, Thomas Schwentick & Luc Segoufin (2009): Two-variable logic on data trees and XML reasoning. J. ACM 56(3), pp. 13:1–13:48, doi:10.1145/1516512.1516515.
  4. James Cheney (2013): Static Enforceability of XPath-Based Access Control Policies. In: Proceedings of the 14th International Symposium on Database Programming Languages. Available at http://arxiv.org/abs/1308.0502.
  5. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi & Pierangela Samarati (2002): A fine-grained access control system for XML documents. ACM Trans. Inf. Syst. Secur. 5(2), pp. 169–202, doi:10.1145/505586.505590.
  6. Kenji Hashimoto, Hiroto Kawai, Yasunori Ishihara & Toru Fujiwara (2012): Decidability of the Security against Inference Attacks using a Functional Dependency on XML Databases. IEICE Transactions on Information and Systems E95-D(5), pp. 1365–1374, doi:10.1587/transinf.E95.D.1365.
  7. Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara & Toru Fujiwara (2009): Verification of the Security against Inference attacks on XML Databases. IEICE Transactions on Information and Systems E92-D(5), pp. 1022–1032, doi:10.1587/transinf.E92.D.1022.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org