Abstract
XML access control models proposed in the literature enforce access restrictions directly on the structure and content of an XML document. Therefore, the authorization must be revised whenever the structure of an XML document is changed. In this paper we present an approach that translates the authorizations for the transformed XML document. We focus on the case where schemas of the source and transformed documents represent the same concept. This approach is strongly based on schema mapping information between the source and transformed XML schemas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
AlphaWorks. Data Descriptors by Example, January 8, 2001. http://www.alphaworks.ibm.com/tech/DDbE.
E. Bertino et al., “Specifying and Enforcing Access Control Policies for XML Document Sources,” World Wide Web, Baltzer Science Publishers, Netherlands, vol. 3, no. 3, 2000.
T. Bray et al. “Extensible Markup Language (XML) 1.0 (Second Edition)”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/REC-xml (October 2000).
J. Clark et al. “XML Path Language (XPath) Version 1.0”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/xpath (November 1999).
J. Clark. “XSL Transformations (XSLT) Version 1.0”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/xslt (November 1999).
E. Damiani, et al., Securing XML documents. In Proceedings of the 2000 International Conference on Extending Database Technology (EDBT’2000), Germany, March 2000.
M. H. Kay. SAXON DTDGenerator, http://users.iclway.co.uk/mhkay/saxon/saxon5-5-1/dtdgen.html, 13 April 1999.
M. Kudo and S. Hada. “XML Document Security based on Provisional Authorization”. Proceedings of the 7th ACM conference on Computer and Communications Security. November 2000, Athens Greece.
T. Milo and S. Zohar. Using schema matching to simplify heterogeneous data translation. In VLDB, pages 122–133, 1998.
H. Su, H. Kuno, E.A. Rundensteiner, “Automating the Transformation of XML Documents” Advances in Web-Age Information Management, 2nd International Conference WIDM 2001: 68–75, July 9–11, 2001.
M. Yoshikawa, et al., XRel: “A Path-Based Approach to Storage and Retrieval of XML Documents Using Relational Databases”. ACM Transactions on Internet Technology, Vol. 1, No. 1, pp. 110–141, 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chatvichienchai, S., Iwaihara, M., Kambayashi, Y. (2002). Translating Access Authorizations for Transformed XML Documents. In: Hameurlain, A., Cicchetti, R., Traunmüller, R. (eds) Database and Expert Systems Applications. DEXA 2002. Lecture Notes in Computer Science, vol 2453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46146-9_29
Download citation
DOI: https://doi.org/10.1007/3-540-46146-9_29
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44126-7
Online ISBN: 978-3-540-46146-3
eBook Packages: Springer Book Archive