A Review of XML Technologies for Enhancing Security in Advanced Database Management Systems

Year : 2026 | Volume : 13 | 01 | Page :
    By

    P. Devi Sravanthi,

  • Manas Kumar Yogi,

  1. Assistant Professor, Department of Artificial Intelligence Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India
  2. Assistant Professor, Department of Artificial Intelligence Engineering, Pragati Engineering College, Surampalem, Andhra Pradesh, India

Abstract

The integration of Extensible Markup Language (XML) technologies into advanced database management systems (DBMS) has revolutionized data storage, retrieval, and security paradigms. This comprehensive review examines the critical role of XML-based security mechanisms in protecting sensitive data within contemporary database environments. The study explores various XML security technologies, including XML encryption, XML digital signatures, XML access control models, and XML firewalls, analyzing their implementation strategies and effectiveness in mitigating database vulnerabilities. Through systematic analysis of recent developments spanning 2020-2025, this review identifies emerging trends in XML-based authentication protocols, query injection prevention techniques, and schema validation mechanisms. The paper further investigates the integration of XML security standards such as WS-Security, XACML, and SAML in database security architectures. Findings indicate that XML technologies provide robust frameworks for implementing fine-grained access control, ensuring data integrity, and maintaining confidentiality across distributed database systems. This review contributes to the understanding of XML security implementations and provides practical insights for database administrators and security professionals.

Keywords: XML, Security, Attack, DBMS, Firewalls, Sensitive

How to cite this article:
P. Devi Sravanthi, Manas Kumar Yogi. A Review of XML Technologies for Enhancing Security in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-.
How to cite this URL:
P. Devi Sravanthi, Manas Kumar Yogi. A Review of XML Technologies for Enhancing Security in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joadms/article=2026/view=242271


References

  1. Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
  2. Yusuf A. Performance analysis of the encryption algorithms as solution to cloud database security. International Journal of Computer Applications. 2014 Jan 1.
  3. Jin Y, Kaja K. XACML Implementation Based on Graph Databases. InCATA 2019 (pp. 65-74).
  4. Takase T, Uramoto N, Baba K. XML digital signature system independent of existing applications. InProceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops 2002 Jan 28 (pp. 150-157). IEEE.
  5. Lan Y, C. Samonte MJ, Wang X. SAM-based localization method for image copy-move forgery. InProceedings of the 2024 10th International Conference on Computer Technology Applications 2024 May 15 (pp. 200-208).
  6. Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
  7. Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).
  8. Yusuf A. Performance analysis of the encryption algorithms as solution to cloud database security. International Journal of Computer Applications. 2014 Jan 1.
  9. Jin Y, Kaja K. XACML Implementation Based on Graph Databases. InCATA 2019 (pp. 65-74).
  10. Takase T, Uramoto N, Baba K. XML digital signature system independent of existing applications. InProceedings 2002 Symposium on Applications and the Internet (SAINT) Workshops 2002 Jan 28 (pp. 150-157). IEEE.
  11. Lan Y, C. Samonte MJ, Wang X. SAM-based localization method for image copy-move forgery. InProceedings of the 2024 10th International Conference on Computer Technology Applications 2024 May 15 (pp. 200-208).
  12. Wang H, Lakshmanan LV. Efficient secure query evaluation over encrypted XML databases. InProceedings of the 32nd international conference on Very large data bases 2006 Sep 1 (pp. 127-138).

Ahead of Print Subscription Review Article
Volume 13
01
Received 13/02/2026
Accepted 20/02/2026
Published 20/03/2026
Publication Time 35 Days


Login


My IP

PlumX Metrics