Reference Hub2
Storage and Access Control Issues for XML Documents

Storage and Access Control Issues for XML Documents

George Pallis, Konstantina Stoupa, Athena Vakali
Copyright: © 2004 |Pages: 37
ISBN13: 9781591402084|ISBN10: 1591402085|EISBN13: 9781591402091
DOI: 10.4018/978-1-59140-208-4.ch004
Cite Chapter Cite Chapter

MLA

David Taniar and Johanna Wenny Rahayu. "Storage and Access Control Issues for XML Documents." Web Information Systems, IGI Global, 2004, pp.104-140. https://doi.org/10.4018/978-1-59140-208-4.ch004

APA

D. Taniar & J. Rahayu (2004). Storage and Access Control Issues for XML Documents. IGI Global. https://doi.org/10.4018/978-1-59140-208-4.ch004

Chicago

David Taniar and Johanna Wenny Rahayu. "Storage and Access Control Issues for XML Documents." In Web Information Systems. Hershey, PA: IGI Global, 2004. https://doi.org/10.4018/978-1-59140-208-4.ch004

Export Reference

Mendeley
Favorite

Abstract

XML documents management is becoming an area of great research value and interest since XML has become a popular standard for data communication and knowledge exchange over the Internet. Therefore, new issues have emerged in terms of storage and access control policies for XML documents. Concerning the storage issues, the majority of proposals rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories). It is important to consider storage and access control together since these issues are essential in implementations for XML documents management. Moreover, the chapter focuses on the recent access control models which guarantee the security of the XML-based data, which are located in a variety of storage topologies. This chapter’s goal is to survey and classify existing approaches for XML documents storage and access control, and, at the same time, highlight the main differences between them. The most popular XML database software tools are outlined in terms of their storage and access control policies.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.