Back to Search
Start Over
Generalized XML security views
- Source :
- SACMAT
- Publication Year :
- 2005
- Publisher :
- ACM, 2005.
-
Abstract
- We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [22] and later refined by Fan et al. [12]. The model consists of access control policies specified over DTDs with XPath expression for data-dependent access control policies. We provide the notion of security views for characterizing information accessible to authorized users. This is a transformed (sanitized) DTD schema that can be used by users for query formulation and optimization. Then we show an algorithm to materialize "authorized" version of the document from the view and an algorithm to construct the view from an access control specification. We show that our view construction combined with materialization produces the same result as the direct application of the DTD access specification on the document. To avoid the overhead of view materialization in query answering, user queries should undergo rewriting so that they are valid over the original DTD schema, and thus the query answer is computed from the original XML data. We provide an algorithm for query rewriting and show its performance compared with the naive approach, i.e. the approach when query is evaluated over materialized view. We also propose a number of generalizations of possible security policies.
- Subjects :
- Document Structure Description
XML Encryption
Theoretical computer science
Computer Networks and Communications
Computer science
computer.internet_protocol
Access control
Security policy
computer.software_genre
Logical security
Simple API for XML
RELAX NG
Safety, Risk, Reliability and Quality
QA076 Data Base Management
XPath
Information retrieval
Database
business.industry
InformationSystems_DATABASEMANAGEMENT
XML validation
Computer security model
ComputingMethodologies_DOCUMENTANDTEXTPROCESSING
business
computer
Software
XML
Information Systems
Subjects
Details
- Database :
- OpenAIRE
- Journal :
- Proceedings of the tenth ACM symposium on Access control models and technologies
- Accession number :
- edsair.doi.dedup.....55e75a19512f20bae4fca516dc674bc3
- Full Text :
- https://doi.org/10.1145/1063979.1063994