Skip to main content

Static Verification of Access Control Model for AXML Documents

  • Conference paper
Book cover Advances in Data and Web Management (APWeb 2007, WAIM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4505))

  • 1128 Accesses

Abstract

Reasoning about the access control model for AXML documents is a non-trivial topic because of its own challenging issues: the hierarchical nature of XML with embedded service call and query transformation. In this paper, we present a methodology to specify an access control model (GUPster) for AXML (Active XML) documents by translating a query, schema, and access control policy in CSP language. Then, we show how to verify access control policies of AXML documents, by illustrating the running example, with the FDR model checker. Finally, the examples demonstrate that our automated static verification is efficient to analyze security problems, not only whether the policies give legitimate users enough permissions to read data, but also whether the policies prevent unauthorized users from reading sensitive data.

This work was supported by the INRIA projects ARC-ASAX.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abiteboul, S., Alxe, B., Benjelloun, O., Cautis, B., Fundulaki, I., Milo, T., Sahuguet, A.: An Electronic Patient Record ”On Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious. In: Proceedings of VLDB Conference (2004)

    Google Scholar 

  2. Bryans, J.: Reasoning about XACML policies using CSP. In: Proceedings of SWS Workshop, pp. 28–35 (2005)

    Google Scholar 

  3. Active XML (AXML) Home Page (2004), http://activexml.net

  4. E. Damiani. S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. “A Fine-Grained Access Control System for XML Documents”, TISSEC, 5(2):169-202, 2002.

    Article  Google Scholar 

  5. Formal Systems Ltd. FDR2 User Manual (Aug. 1999)

    Google Scholar 

  6. Gabillion, A., Bruno, E.: Regulating Access to XML Documents. In: Proceedings of Working Conference on Database and Application Security (2001)

    Google Scholar 

  7. Godik, S., Moses, T.: eXtensible Access Control Markup Language(XACML) version 1.0. Technical Report, OASIS (2003)

    Google Scholar 

  8. Murata, M., Tozawa, A., Kudo, M.: XML Access Control Using Static Analysis. In: Proceedings of CCS Conference, pp. 73–84 (2002)

    Google Scholar 

  9. Roscoe, A.W.: The Theory and Practice of Concurrency. Prentice-Hall, Englewood Cliffs (1997)

    Google Scholar 

  10. Sahuguet, A., Hull, R., Lieuwen, D.F., Xiong, M.: Enter Once, Share Everywhere: User Profile Management in Converged Networks. In: Proceedings of CIDR Conference (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Guozhu Dong Xuemin Lin Wei Wang Yun Yang Jeffrey Xu Yu

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Kim, IG. (2007). Static Verification of Access Control Model for AXML Documents . In: Dong, G., Lin, X., Wang, W., Yang, Y., Yu, J.X. (eds) Advances in Data and Web Management. APWeb WAIM 2007 2007. Lecture Notes in Computer Science, vol 4505. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72524-4_71

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72524-4_71

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72483-4

  • Online ISBN: 978-3-540-72524-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics