{"id":"https://openalex.org/W2046575063","doi":"https://doi.org/10.1145/1284680.1284684","title":"Dynamic access-control policies on XML encrypted data","display_name":"Dynamic access-control policies on XML encrypted data","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2046575063","doi":"https://doi.org/10.1145/1284680.1284684","mag":"2046575063"},"language":"en","primary_location":{"id":"doi:10.1145/1284680.1284684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1284680.1284684","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084985579","display_name":"Luc Bouganim","orcid":"https://orcid.org/0000-0002-2273-9987"},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210165330","display_name":"Institut Lavoisier de Versailles","ror":"https://ror.org/05mzd8v39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4210128300","https://openalex.org/I4210165330"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Luc Bouganim","raw_affiliation_strings":["INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","University of Versailles, Versailles Cedex, France"],"affiliations":[{"raw_affiliation_string":"INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I4210165330"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084887119","display_name":"Fran\u00e7ois Dang Ngoc","orcid":null},"institutions":[{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]},{"id":"https://openalex.org/I4210165330","display_name":"Institut Lavoisier de Versailles","ror":"https://ror.org/05mzd8v39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4210128300","https://openalex.org/I4210165330"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Francois Dang Ngoc","raw_affiliation_strings":["INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","University of Versailles, Versailles Cedex, France"],"affiliations":[{"raw_affiliation_string":"INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I4210165330"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5111925857","display_name":"Philippe Pucheral","orcid":null},"institutions":[{"id":"https://openalex.org/I4210165330","display_name":"Institut Lavoisier de Versailles","ror":"https://ror.org/05mzd8v39","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I195731000","https://openalex.org/I277688954","https://openalex.org/I4210128300","https://openalex.org/I4210165330"]},{"id":"https://openalex.org/I1326498283","display_name":"Institut national de recherche en informatique et en automatique","ror":"https://ror.org/02kvxyf05","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1326498283"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Philippe Pucheral","raw_affiliation_strings":["INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","University of Versailles, Versailles Cedex, France"],"affiliations":[{"raw_affiliation_string":"INRIA Rocquencourt and PRiSM Laboratory, Le Chesnay Cedex, France; University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I1326498283"]},{"raw_affiliation_string":"University of Versailles, Versailles Cedex, France","institution_ids":["https://openalex.org/I4210165330"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084985579"],"corresponding_institution_ids":["https://openalex.org/I1326498283","https://openalex.org/I4210165330"],"apc_list":null,"apc_paid":null,"fwci":4.0043,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.93477901,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"10","issue":"4","first_page":"1","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9059423208236694},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6908566951751709},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6712033152580261},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.6120914220809937},{"id":"https://openalex.org/keywords/xml-encryption","display_name":"XML Encryption","score":0.5253267288208008},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5101850032806396},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48970988392829895},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4551146626472473},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.41551458835601807},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3903172016143799},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3673350214958191},{"id":"https://openalex.org/keywords/xml-framework","display_name":"XML framework","score":0.2985351085662842},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22867351770401}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9059423208236694},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6908566951751709},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6712033152580261},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6120914220809937},{"id":"https://openalex.org/C173242113","wikidata":"https://www.wikidata.org/wiki/Q607488","display_name":"XML Encryption","level":4,"score":0.5253267288208008},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5101850032806396},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48970988392829895},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4551146626472473},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.41551458835601807},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3903172016143799},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3673350214958191},{"id":"https://openalex.org/C21761406","wikidata":"https://www.wikidata.org/wiki/Q8042330","display_name":"XML framework","level":3,"score":0.2985351085662842},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22867351770401},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1284680.1284684","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1284680.1284684","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W24659197","https://openalex.org/W193121434","https://openalex.org/W421997344","https://openalex.org/W1499220070","https://openalex.org/W1519440323","https://openalex.org/W1525451939","https://openalex.org/W1566345534","https://openalex.org/W1660562555","https://openalex.org/W1749179515","https://openalex.org/W1918015020","https://openalex.org/W1924362975","https://openalex.org/W1969783316","https://openalex.org/W1979331092","https://openalex.org/W2002089154","https://openalex.org/W2022860157","https://openalex.org/W2024987747","https://openalex.org/W2029970296","https://openalex.org/W2031338211","https://openalex.org/W2037392323","https://openalex.org/W2043508455","https://openalex.org/W2048652724","https://openalex.org/W2052413942","https://openalex.org/W2064457255","https://openalex.org/W2075605055","https://openalex.org/W2076382341","https://openalex.org/W2079799821","https://openalex.org/W2083308531","https://openalex.org/W2089507241","https://openalex.org/W2091712649","https://openalex.org/W2095417143","https://openalex.org/W2097960249","https://openalex.org/W2099849300","https://openalex.org/W2105971467","https://openalex.org/W2107683037","https://openalex.org/W2110028693","https://openalex.org/W2124581454","https://openalex.org/W2127492972","https://openalex.org/W2129467756","https://openalex.org/W2134170665","https://openalex.org/W2160207938","https://openalex.org/W2161967451","https://openalex.org/W2165108414","https://openalex.org/W2165128972","https://openalex.org/W2171084616","https://openalex.org/W4246575857","https://openalex.org/W4247091224"],"related_works":["https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W2105580438","https://openalex.org/W2057435755","https://openalex.org/W2018782216","https://openalex.org/W2949620858","https://openalex.org/W2770877918","https://openalex.org/W1989375655","https://openalex.org/W2911113383"],"abstract_inverted_index":{"The":[0,105],"erosion":[1],"of":[2,21,69,75,136,195,211,216,230],"trust":[3],"put":[4],"in":[5,10,110,158],"traditional":[6],"database":[7],"servers":[8,35],"and":[9,14,41,101,171,197,215,224],"Database":[11],"Service":[12],"Providers":[13],"the":[15,32,54,58,73,133,159,168,176,187,212,217,228,231,234],"growing":[16],"interest":[17],"for":[18],"different":[19,26,209],"forms":[20],"selective":[22],"data":[23,39,146],"dissemination":[24,43],"are":[25,162],"factors":[27],"that":[28,185],"lead":[29],"to":[30,36,48,129,154],"move":[31],"access-control":[33,55,85,103,106,218],"from":[34,65,125,192],"clients.":[37],"Different":[38],"encryption":[40,59],"key":[42],"schemes":[44,86],"have":[45],"been":[46],"proposed":[47],"serve":[49],"this":[50],"purpose.":[51],"By":[52],"compiling":[53],"rules":[56],"into":[57],"process,":[60],"all":[61],"these":[62],"methods":[63],"suffer":[64],"a":[66,93,111,126,137,242,246],"static":[67],"way":[68],"sharing":[70],"data.":[71],"With":[72],"emergence":[74],"hardware":[76,120,248],"security":[77,182],"elements":[78,170],"on":[79,208,222,237,245],"client":[80],"devices,":[81],"more":[82],"dynamic":[83,102],"client-based":[84,95],"can":[87,202],"be":[88,203],"devised.":[89],"This":[90,122],"paper":[91,235],"proposes":[92],"tamper-resistant":[94],"XML":[96,140,213],"access-right":[97],"controller":[98],"supporting":[99],"flexible":[100],"policies.":[104],"engine":[107,123],"is":[108,148,179,190],"embedded":[109],"hardware-secure":[112],"device":[113],"and,":[114],"therefore,":[115],"must":[116],"cope":[117],"with":[118,241],"specific":[119],"resources.":[121],"benefits":[124],"dedicated":[127],"index":[128],"quickly":[130],"converge":[131],"toward":[132],"authorized":[134],"parts":[135,174],"potentially":[138],"streaming":[139],"document.":[141],"Pending":[142],"situations":[143],"(i.e.,":[144],"where":[145],"delivery":[147],"conditioned":[149],"by":[150,205],"predicates,":[151],"which":[152],"apply":[153],"values":[155],"encountered":[156],"afterward":[157],"document":[160,189,214],"stream)":[161],"handled":[163],"gracefully,":[164],"skipping,":[165],"whenever":[166],"possible":[167],"pending":[169,177],"reassembling":[172],"relevant":[173],"when":[175],"situation":[178],"solved.":[180],"Additional":[181],"mechanisms":[183],"guarantee":[184],"(1)":[186],"input":[188],"protected":[191],"any":[193],"form":[194],"tampering":[196],"(2)":[198],"no":[199],"forbidden":[200],"information":[201],"gained":[204],"replay":[206],"attacks":[207],"versions":[210],"rules.":[219],"Performance":[220],"measurements":[221],"synthetic":[223],"real":[225],"datasets":[226],"demonstrate":[227],"effectiveness":[229],"approach.":[232],"Finally,":[233],"reports":[236],"two":[238],"experiments":[239],"conducted":[240],"prototype":[243],"running":[244],"secured":[247],"platform.":[249]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
