Abstract
XML becomes a standard format for data interchanges on Internet, especially in E-commerce. Although XML technology has been widely used, the research and development on XML security is still at the early stage. The control of XML access is important for protecting XML documents from being illegally modified or accessed. Most of available models utilize a single level check point. In this paper, we proposed an access control model with dual level access control: file-level and element-level (or attribute-level). The model allows adopt the XBLP policy with file-level security, while employs Hide-Node View for element-level security. The architecture framework of the access control model and implementation are briefly described.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bertino, E., Ferrari, E.: Secure and Selective dissemination of XML documents. ACM Transactions on Information and System Security 5(3), 290–331 (2003)
Cho, S., Amer-Yahia, S., Lakshmanan, L., Srivastav, D.: Optimizing the Secure Evaluation of Twig Queries. In: Proc. of 28th VLDB, pp. 490–501 (2002)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Documents. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, pp. 121–135. Springer, Heidelberg (2000)
Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-grained Access Control System for XML Documents. ACM Transactions on Information and System Security 5(2), 169–202 (2002)
Hada, S., Kudo, M.: XML Access Control Language: Provisional Authorization for XML Documents, http://www.trl.ibm.com/projects/xml/xacl/xacl-spec.html
Oasis: eXtensible Access Control Markup Language (XACML), http://www.oasis-open.org/committees/xcaml
Miklau, G., Suciu, D.: Controlling Access to Published Data Using Cryptography. In: Proc. of 29th VLDB, pp. 898–909 (2003)
Murata, M., Tozawa, A., Kudo, M., Hada, S.: XML Access Control Using Static Analysis. In: Proc. of Computer and Communications Security, pp. 73–84 (2003)
Fan, W., Chan, C.Y., Garofalakis, M.: Secure XML Querying with Security Views. In: Proc. of the 2004 ACM SIGMOD, pp. 587–598 (2004)
Fundulaki, I., Marx, M.: Specifying Access Control Policies for XML Documents with XPath. In: Proc. of 9th SACMAT, pp. 61–69. ACM Press, New York (2004)
Li, L., He, Y.Z., Feng, D.G.: A Fine-Grained Mandatory Access Control Model for XML Documents. Journal of Software 15(10), 1528–1537 (2004)
Sandhu, R., Coyne, E.J., Feinstein, H.L.: Role Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sun, W., Liu, Dx., Wang, T. (2006). A Model of XML Access Control with Dual-Level Security Views. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_109
Download citation
DOI: https://doi.org/10.1007/11610496_109
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)