Skip to main content

Translating Access Authorizations for Transformed XML Documents

  • Conference paper
  • First Online:
Book cover Database and Expert Systems Applications (DEXA 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2453))

Included in the following conference series:

Abstract

XML access control models proposed in the literature enforce access restrictions directly on the structure and content of an XML document. Therefore, the authorization must be revised whenever the structure of an XML document is changed. In this paper we present an approach that translates the authorizations for the transformed XML document. We focus on the case where schemas of the source and transformed documents represent the same concept. This approach is strongly based on schema mapping information between the source and transformed XML schemas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AlphaWorks. Data Descriptors by Example, January 8, 2001. http://www.alphaworks.ibm.com/tech/DDbE.

  2. E. Bertino et al., “Specifying and Enforcing Access Control Policies for XML Document Sources,” World Wide Web, Baltzer Science Publishers, Netherlands, vol. 3, no. 3, 2000.

    Google Scholar 

  3. T. Bray et al. “Extensible Markup Language (XML) 1.0 (Second Edition)”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/REC-xml (October 2000).

  4. J. Clark et al. “XML Path Language (XPath) Version 1.0”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/xpath (November 1999).

  5. J. Clark. “XSL Transformations (XSLT) Version 1.0”. World Wide Web Consortium (W3C). http://www.w3c.org/TR/xslt (November 1999).

  6. E. Damiani, et al., Securing XML documents. In Proceedings of the 2000 International Conference on Extending Database Technology (EDBT’2000), Germany, March 2000.

    Google Scholar 

  7. M. H. Kay. SAXON DTDGenerator, http://users.iclway.co.uk/mhkay/saxon/saxon5-5-1/dtdgen.html, 13 April 1999.

  8. M. Kudo and S. Hada. “XML Document Security based on Provisional Authorization”. Proceedings of the 7th ACM conference on Computer and Communications Security. November 2000, Athens Greece.

    Google Scholar 

  9. T. Milo and S. Zohar. Using schema matching to simplify heterogeneous data translation. In VLDB, pages 122–133, 1998.

    Google Scholar 

  10. H. Su, H. Kuno, E.A. Rundensteiner, “Automating the Transformation of XML Documents” Advances in Web-Age Information Management, 2nd International Conference WIDM 2001: 68–75, July 9–11, 2001.

    Google Scholar 

  11. M. Yoshikawa, et al., XRel: “A Path-Based Approach to Storage and Retrieval of XML Documents Using Relational Databases”. ACM Transactions on Internet Technology, Vol. 1, No. 1, pp. 110–141, 2001.

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chatvichienchai, S., Iwaihara, M., Kambayashi, Y. (2002). Translating Access Authorizations for Transformed XML Documents. In: Hameurlain, A., Cicchetti, R., Traunmüller, R. (eds) Database and Expert Systems Applications. DEXA 2002. Lecture Notes in Computer Science, vol 2453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46146-9_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-46146-9_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44126-7

  • Online ISBN: 978-3-540-46146-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics