{"id":"https://openalex.org/W2085244140","doi":"https://doi.org/10.1145/1210263.1210266","title":"Relevancy-based access control and its evaluation on versioned XML documents","display_name":"Relevancy-based access control and its evaluation on versioned XML documents","publication_year":2007,"publication_date":"2007-02-01","ids":{"openalex":"https://openalex.org/W2085244140","doi":"https://doi.org/10.1145/1210263.1210266","mag":"2085244140"},"language":"en","primary_location":{"id":"doi:10.1145/1210263.1210266","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1210263.1210266","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5047052126","display_name":"Mizuho Iwaihara","orcid":"https://orcid.org/0000-0001-6985-9671"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Mizuho Iwaihara","raw_affiliation_strings":["Kyoto University, Kyoto, Japan","Kyoto University, Kyoto, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Kyoto University, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]},{"raw_affiliation_string":"Kyoto University, Kyoto, Japan#TAB#","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007298115","display_name":"Ryotaro Hayashi","orcid":null},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Ryotaro Hayashi","raw_affiliation_strings":["Kyoto University, Kyoto, Japan","Kyoto University, Kyoto, Japan#TAB#"],"affiliations":[{"raw_affiliation_string":"Kyoto University, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]},{"raw_affiliation_string":"Kyoto University, Kyoto, Japan#TAB#","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068856561","display_name":"Somchai Chatvichienchai","orcid":"https://orcid.org/0009-0007-7835-9864"},"institutions":[{"id":"https://openalex.org/I132400726","display_name":"University of Nagasaki","ror":"https://ror.org/03ppx1p25","country_code":"JP","type":"education","lineage":["https://openalex.org/I132400726"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Somchai Chatvichienchai","raw_affiliation_strings":["Siebold University of Nagasaki, Nagasaki, Japan"],"affiliations":[{"raw_affiliation_string":"Siebold University of Nagasaki, Nagasaki, Japan","institution_ids":["https://openalex.org/I132400726"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105510423","display_name":"Chutiporn Anutariya","orcid":"https://orcid.org/0000-0001-7101-212X"},"institutions":[{"id":"https://openalex.org/I181635417","display_name":"Shinawatra University","ror":"https://ror.org/02sr8jt85","country_code":"TH","type":"education","lineage":["https://openalex.org/I181635417"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Chutiporn Anutariya","raw_affiliation_strings":["Shinawatra University, Thailand"],"affiliations":[{"raw_affiliation_string":"Shinawatra University, Thailand","institution_ids":["https://openalex.org/I181635417"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110195292","display_name":"Vilas Wuwongse","orcid":null},"institutions":[{"id":"https://openalex.org/I38538140","display_name":"Asian Institute of Technology","ror":"https://ror.org/0403qcr87","country_code":"TH","type":"education","lineage":["https://openalex.org/I38538140"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Vilas Wuwongse","raw_affiliation_strings":["Asian Institute of Technology, Thailand"],"affiliations":[{"raw_affiliation_string":"Asian Institute of Technology, Thailand","institution_ids":["https://openalex.org/I38538140"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5047052126"],"corresponding_institution_ids":["https://openalex.org/I22299242"],"apc_list":null,"apc_paid":null,"fwci":1.2835,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82186595,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"10","issue":"1","first_page":"3","last_page":"3"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8753463625907898},{"id":"https://openalex.org/keywords/xml-schema-editor","display_name":"XML Schema Editor","score":0.6692426204681396},{"id":"https://openalex.org/keywords/document-structure-description","display_name":"Document Structure Description","score":0.6653706431388855},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.6595209836959839},{"id":"https://openalex.org/keywords/xml-validation","display_name":"XML validation","score":0.6182563304901123},{"id":"https://openalex.org/keywords/xml-schema","display_name":"XML Schema (W3C)","score":0.6039283871650696},{"id":"https://openalex.org/keywords/efficient-xml-interchange","display_name":"Efficient XML Interchange","score":0.6033572554588318},{"id":"https://openalex.org/keywords/streaming-xml","display_name":"Streaming XML","score":0.6005709171295166},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.49799060821533203},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.496601402759552},{"id":"https://openalex.org/keywords/xml-signature","display_name":"XML Signature","score":0.46280235052108765},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4408888518810272},{"id":"https://openalex.org/keywords/schema","display_name":"Schema (genetic algorithms)","score":0.42469415068626404},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.4176706373691559},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.3708740472793579},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.33971190452575684},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.1165766716003418}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8753463625907898},{"id":"https://openalex.org/C34716815","wikidata":"https://www.wikidata.org/wiki/Q8042322","display_name":"XML Schema Editor","level":3,"score":0.6692426204681396},{"id":"https://openalex.org/C68699486","wikidata":"https://www.wikidata.org/wiki/Q265904","display_name":"Document Structure Description","level":3,"score":0.6653706431388855},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6595209836959839},{"id":"https://openalex.org/C55348073","wikidata":"https://www.wikidata.org/wiki/Q595926","display_name":"XML validation","level":3,"score":0.6182563304901123},{"id":"https://openalex.org/C40713593","wikidata":"https://www.wikidata.org/wiki/Q16342","display_name":"XML Schema (W3C)","level":5,"score":0.6039283871650696},{"id":"https://openalex.org/C11508877","wikidata":"https://www.wikidata.org/wiki/Q1124477","display_name":"Efficient XML Interchange","level":3,"score":0.6033572554588318},{"id":"https://openalex.org/C44883583","wikidata":"https://www.wikidata.org/wiki/Q7622687","display_name":"Streaming XML","level":3,"score":0.6005709171295166},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.49799060821533203},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.496601402759552},{"id":"https://openalex.org/C34330436","wikidata":"https://www.wikidata.org/wiki/Q979532","display_name":"XML Signature","level":4,"score":0.46280235052108765},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4408888518810272},{"id":"https://openalex.org/C52146309","wikidata":"https://www.wikidata.org/wiki/Q7431116","display_name":"Schema (genetic algorithms)","level":2,"score":0.42469415068626404},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.4176706373691559},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3708740472793579},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.33971190452575684},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.1165766716003418}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1210263.1210266","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1210263.1210266","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W198528920","https://openalex.org/W1515484833","https://openalex.org/W1533573623","https://openalex.org/W1937082285","https://openalex.org/W1987252374","https://openalex.org/W2019725502","https://openalex.org/W2040714324","https://openalex.org/W2089507241","https://openalex.org/W2091712649","https://openalex.org/W2103297792","https://openalex.org/W2109464129","https://openalex.org/W2111087864","https://openalex.org/W2171745828","https://openalex.org/W2271328583","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2357844625","https://openalex.org/W1530834279","https://openalex.org/W3194587731","https://openalex.org/W1973016436","https://openalex.org/W2251451180","https://openalex.org/W2183806292","https://openalex.org/W136483137","https://openalex.org/W2496836920","https://openalex.org/W2056514291","https://openalex.org/W2149239326"],"abstract_inverted_index":{"Integration":[0],"of":[1,6,12,19,43,54,61,68,105,118,132,144],"version":[2,72,125,160],"and":[3,76,110],"access":[4,14,56,119],"control":[5],"XML":[7,20,23,63,88,134],"documents":[8,24,64,135],"has":[9],"the":[10,37,41,52,103,123,138],"benefit":[11],"regulating":[13],"to":[15],"rapidly":[16],"growing":[17],"archives":[18,131],"documents.":[21],"Versioned":[22],"provide":[25],"us":[26],"with":[27],"valuable":[28],"information":[29],"on":[30],"dependencies":[31],"between":[32],"document":[33,89],"nodes,":[34],"but,":[35],"at":[36,137],"same":[38,139],"time,":[39,140],"presenting":[40],"risk":[42],"undesirable":[44],"data":[45],"disclosure.":[46],"In":[47],"this":[48],"article,":[49],"we":[50,121],"introduce":[51,102],"notion":[53,104],"relevancy-based":[55,97,113],"control,":[57],"which":[58,91,127,156],"realizes":[59,128],"protection":[60],"versioned":[62,133],"by":[65],"various":[66],"types":[67],"relevancy,":[69],"such":[70],"as":[71],"dependencies,":[73],"schema":[74],"similarities,":[75],"temporal":[77],"proximity.":[78],"We":[79,100],"define":[80],"a":[81],"new":[82],"path":[83],"query":[84],"language":[85],"XVerPath":[86,145],"over":[87,153],"versions,":[90],"can":[92],"be":[93],"utilized":[94],"for":[95,108],"specifying":[96,112],"access-control":[98],"policies.":[99,114],"also":[101],"relevancy":[106],"class,":[107],"collectively":[109],"compactly":[111],"Regarding":[115],"efficient":[116,142],"processing":[117],"requests,":[120],"propose":[122],"packed":[124],"model,":[126],"space-efficient":[129],"difference-based":[130],"and,":[136],"providing":[141],"evaluation":[143],"queries.":[146],"Experimental":[147],"results":[148],"show":[149],"reasonable":[150],"performance":[151],"superiority":[152],"conventional":[154],"methods,":[155],"do":[157],"not":[158],"utilize":[159],"differences.":[161]},"counts_by_year":[{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
