Skip to main content

A Novel Labeling Scheme for Secure Broadcasting of XML Data

  • Conference paper
Knowledge Discovery from XML Documents (KDXD 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3915))

Included in the following conference series:

Abstract

With the fast development of the Web, a web document source periodically broadcasts its document to multiple users. The web document could contain the sensitive information and it should be sent to users who have an authority accessing the sensitive information. In a well-known method, called XML Pool Encryption, the sensitive information is separated from the document, and then, it is encrypted. Therefore, reconstruction of a document is required when the document is shown to a user. For the reconstruction, it is very important that we identify the location of decrypted information effectively and efficiently. In this paper, we propose a labeling scheme to support the fast reconstruction of document, based on the use of encryption techniques. The proposed labeling scheme supports the inference of structure information in any portion of the document. In the experimental results, our labeling scheme shows an efficiency in searching for the location of decrypted information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abiteboul, S., Bunneman, P., Suciu, D.: Data on the Web:From Relations to Semi-structured Data and XML. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  2. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Controlled access and dissemination of xml document. In: ACM Web Information and Data Management, pp. 22–27 (1999)

    Google Scholar 

  3. Damiani, E., di Vidercati, S.D.C., Paraboschi, S., Samarati, P.: Securing xml documents. In: EDBT, pp. 121–135 (2000)

    Google Scholar 

  4. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine-grained access control system for xml documents. ACM Transactions on Information and System Security 5(2), 169–202 (2002)

    Article  Google Scholar 

  5. Geuer-Pollmann, C.: Xml pool encryption. In: ACM Workshop on XML Security, pp. 1–9 (2002)

    Google Scholar 

  6. IBM. Xml security suite, http://www.alphawowks.ibm.com/tech/xmlsecuritysuite

  7. Ley, M.: Dblp database web site (2000), http://www.alphawowks.ibm.com/tech/xmlsecuritysuite

  8. Schmidt, A., Wass, F., Kersten, M.L., Carey, M.J., Manolescu, I., Busse, R.: Xmark: A benchmark for xml data management. In: VLDB, pp. 974–985 (2002)

    Google Scholar 

  9. Sun. Java (2005), http://java.sun.com

  10. W3C. Xpath, http://www.w3c.org/TR/XPath

  11. W3C. Xml encryption wg (2001), http://www.w3.org/Encryption/2001/

  12. W3C. Xml-signature syntax and processing (2002), http://www.w3.org/TR/xmldsig-core/

  13. W3C. extensible markup language (xml) 1.0 (2004), http://www.w3.org/TR/REC-xml/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, MJ., Ko, HK., Lee, S. (2006). A Novel Labeling Scheme for Secure Broadcasting of XML Data. In: Nayak, R., Zaki, M.J. (eds) Knowledge Discovery from XML Documents. KDXD 2006. Lecture Notes in Computer Science, vol 3915. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11730262_12

Download citation

  • DOI: https://doi.org/10.1007/11730262_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-33180-3

  • Online ISBN: 978-3-540-33181-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics