P. Devi Sravanthi,
Manas Kumar Yogi,
- Assistant Professor, Department of Artificial Intelligence Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India
- Assistant Professor, Department of Artificial Intelligence Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India
Abstract
The integration of Extensible Markup Language (XML) technologies into advanced database management systems (DBMS) has revolutionized data storage, retrieval, and security paradigms. This comprehensive review examines the critical role of XML-based security mechanisms in protecting sensitive data within contemporary database environments. The study explores various XML security technologies, including XML encryption, XML digital signatures, XML access control models, and XML firewalls, analyzing their implementation strategies and effectiveness in mitigating database vulnerabilities. Through systematic analysis of recent developments spanning 2020-2025, this review identifies emerging trends in XML-based authentication protocols, query injection prevention techniques, and schema validation mechanisms. The paper further investigates the integration of XML security standards such as WS-Security, XACML, and SAML in database security architectures. Findings indicate that XML technologies provide robust frameworks for implementing fine-grained access control, ensuring data integrity, and maintaining confidentiality across distributed database systems. This review contributes to the understanding of XML security implementations and provides practical insights for database administrators and security professionals.
Keywords: XML, Security, Attack, DBMS, Firewalls, Sensitive
P. Devi Sravanthi, Manas Kumar Yogi. A Review of XML Technologies for Enhancing Security in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-.
P. Devi Sravanthi, Manas Kumar Yogi. A Review of XML Technologies for Enhancing Security in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joadms/article=2026/view=242271
References
- Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
- Yusuf A. Performance analysis of the encryption algorithms as solution to cloud database security. International Journal of Computer Applications. 2014 Jan 1.
- Jin Y, Kaja K. XACML Implementation Based on Graph Databases. InCATA 2019 (pp. 65-74).
- Takase T, Uramoto N, Baba K. XML digital signature system independent of existing applications. InProceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops 2002 Jan 28 (pp. 150-157). IEEE.
- Lan Y, C. Samonte MJ, Wang X. SAM-based localization method for image copy-move forgery. InProceedings of the 2024 10th International Conference on Computer Technology Applications 2024 May 15 (pp. 200-208).
- Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
- Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
- Yusuf A. Performance analysis of the encryption algorithms as solution to cloud database security. International Journal of Computer Applications. 2014 Jan 1.
- Jin Y, Kaja K. XACML Implementation Based on Graph Databases. InCATA 2019 (pp. 65-74).
- Takase T, Uramoto N, Baba K. XML digital signature system independent of existing applications. InProceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops 2002 Jan 28 (pp. 150-157). IEEE.
- Lan Y, C. Samonte MJ, Wang X. SAM-based localization method for image copy-move forgery. InProceedings of the 2024 10th International Conference on Computer Technology Applications 2024 May 15 (pp. 200-208).
- Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).

Journal of Advanced Database Management & Systems
| Volume | 13 |
| 01 | |
| Received | 13/02/2026 |
| Accepted | 20/02/2026 |
| Published | 20/03/2026 |
| Publication Time | 35 Days |
Login
PlumX Metrics