Access control of XML documents and business rule processing for advanced information exchange

Mizuho Iwaihara*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper, we summarize our research results obtained through the COE program. Our topics are classified into two categories. One is access control of XML documents, and the other is business rule processing for e-commerce. The former is dealing with various aspects of regulating access to XML documents, so that unauthorized access to data can be prevented. The latter is dealing with formal treatment of business rules for advanced automated e-commerce systems. We studied modeling and querying business rules, and extracting business rules from web pages. We also describe two topics in more detail, one is relevancy-based access control of XML documents, and the other is extracting global policies for efficient access control of XML documents.

Original languageEnglish
Title of host publicationProceedings - Second International Conference on Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2007
Pages177-184
Number of pages8
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventSecond International Conference on Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2007 - Kyoto, Japan
Duration: 2007 Jan 292007 Jan 29

Publication series

NameProceedings - Second International Conference on Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2007

Conference

ConferenceSecond International Conference on Informatics Research for Development of Knowledge Society Infrastructure, ICKS 2007
Country/TerritoryJapan
CityKyoto
Period07/1/2907/1/29

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'Access control of XML documents and business rule processing for advanced information exchange'. Together they form a unique fingerprint.

Cite this