@article{530, author = {Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat}, title = {An XML Access Control Model Considering Update Operations }, journal = {Journal of Information Security Research}, year = {2011}, volume = {2}, number = {2}, doi = {}, url = {http://www.dline.info/jisr/fulltext/v2n2/2.pdf}, abstract = {Several researches have been proposed over the past years to specify a selective access control for XML document. However, most of the previous researches only consider read privilege while specifying XML access control when access control policies support update rights is untouched. Therefore, a challenging issue is how to define an XML access control model to handle update operations that include insertion, deletion, and modification. In this study, we propose an XML access control model to support update privileges. Moreover, we formalize update operations supported by our proposed XML access control model based on the different default and conflict resolution policies which are applied to them. }, }