{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:31Z","timestamp":1750308751918,"version":"3.41.0"},"reference-count":16,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2007,2,1]],"date-time":"2007-02-01T00:00:00Z","timestamp":1170288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2007,2]]},"abstract":"<jats:p>Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable information on dependencies between document nodes, but, at the same time, presenting the risk of undesirable data disclosure. In this article, we introduce the notion of relevancy-based access control, which realizes protection of versioned XML documents by various types of relevancy, such as version dependencies, schema similarities, and temporal proximity. We define a new path query language XVerPath over XML document versions, which can be utilized for specifying relevancy-based access-control policies. We also introduce the notion of relevancy class, for collectively and compactly specifying relevancy-based policies. Regarding efficient processing of access requests, we propose the packed version model, which realizes space-efficient difference-based archives of versioned XML documents and, at the same time, providing efficient evaluation of XVerPath queries. Experimental results show reasonable performance superiority over conventional methods, which do not utilize version differences.<\/jats:p>","DOI":"10.1145\/1210263.1210266","type":"journal-article","created":{"date-parts":[[2007,4,9]],"date-time":"2007-04-09T19:07:12Z","timestamp":1176145632000},"page":"3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Relevancy-based access control and its evaluation on versioned XML documents"],"prefix":"10.1145","volume":"10","author":[{"given":"Mizuho","family":"Iwaihara","sequence":"first","affiliation":[{"name":"Kyoto University, Kyoto, Japan"}]},{"given":"Ryotaro","family":"Hayashi","sequence":"additional","affiliation":[{"name":"Kyoto University, Kyoto, Japan"}]},{"given":"Somchai","family":"Chatvichienchai","sequence":"additional","affiliation":[{"name":"Siebold University of Nagasaki, Nagasaki, Japan"}]},{"given":"Chutiporn","family":"Anutariya","sequence":"additional","affiliation":[{"name":"Shinawatra University, Thailand"}]},{"given":"Vilas","family":"Wuwongse","sequence":"additional","affiliation":[{"name":"Asian Institute of Technology, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2007,2]]},"reference":[{"volume-title":"Proc. 2nd Workshop on Rules and Rule Markup Languages for the Semantic Web. Springer Lecture Note in Computer Science 2876","author":"Anutariya C.","key":"e_1_2_1_1_1","unstructured":"Anutariya , C. , Chatvichienchai , S. , Iwaihara , M. , Wuwongse , V. , and Kambayashi , Y . 2003. A rule-based XML access control model . In Proc. 2nd Workshop on Rules and Rule Markup Languages for the Semantic Web. Springer Lecture Note in Computer Science 2876 . Anutariya, C., Chatvichienchai, S., Iwaihara, M., Wuwongse, V., and Kambayashi, Y. 2003. A rule-based XML access control model. In Proc. 2nd Workshop on Rules and Rule Markup Languages for the Semantic Web. Springer Lecture Note in Computer Science 2876."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.485637"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019289831564"},{"volume-title":"Proc. of the 30th VLDB Conf. 84--95","author":"Bouganim L.","key":"e_1_2_1_4_1","unstructured":"Bouganim , L. , Ngoc , F. D. , and Pucheral , P . 2004. Client-based access control management for XML documents . In Proc. of the 30th VLDB Conf. 84--95 . Bouganim, L., Ngoc, F. D., and Pucheral, P. 2004. Client-based access control management for XML documents. In Proc. of the 30th VLDB Conf. 84--95."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30075-5_76"},{"volume-title":"Proc. 27th VLDB Conf. 291--300","author":"Chien S. Y.","key":"e_1_2_1_6_1","unstructured":"Chien , S. Y. , Tsotras , V. J. , and Zaniolo , C . 2001. Efficient management of multiversion documents by object referencing . In Proc. 27th VLDB Conf. 291--300 . Chien, S. Y., Tsotras, V. J., and Zaniolo, C. 2001. Efficient management of multiversion documents by object referencing. In Proc. 27th VLDB Conf. 291--300."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/505586.505590"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/968559.968567"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1063995"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352613"},{"volume-title":"Proc. 27th VLDB Conf. 581--590","author":"Marian A.","key":"e_1_2_1_11_1","unstructured":"Marian , A. , Abiteboul , S. , Cobna , G. , and Mignet , L . 2001. Change-centric management of versions in an XML warehouse . In Proc. 27th VLDB Conf. 581--590 . Marian, A., Abiteboul, S., Cobna, G., and Mignet, L. 2001. Change-centric management of versions in an XML warehouse. In Proc. 27th VLDB Conf. 581--590."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007686"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564715"},{"volume-title":"W3C Recommendation","year":"1999","key":"e_1_2_1_14_1","unstructured":"W3C. 1999. XML path language (Xpath) version 1.0 . In W3C Recommendation 16 November 1999 , http:\/\/www.w3.org\/TR\/xpath. W3C. 1999. XML path language (Xpath) version 1.0. In W3C Recommendation 16 November 1999, http:\/\/www.w3.org\/TR\/xpath."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/585058.585073"},{"key":"e_1_2_1_16_1","unstructured":"XACML. 2005. extensible access control markup language (XACML) version 2.0. In http:\/\/www.oasis-open.org\/specs\/index.php#xacmlv2.0.  XACML. 2005. extensible access control markup language (XACML) version 2.0. In http:\/\/www.oasis-open.org\/specs\/index.php#xacmlv2.0."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1210263.1210266","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1210263.1210266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:21Z","timestamp":1750278141000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1210263.1210266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,2]]}},"alternative-id":["10.1145\/1210263.1210266"],"URL":"https:\/\/doi.org\/10.1145\/1210263.1210266","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2007,2]]},"assertion":[{"value":"2007-02-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}