Skip to main content

A Rewrite Based Approach for Enforcing Access Constraints for XML

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4694))

Abstract

Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in literature. Recently, a case has been made for expressing access constraints at finer levels of granularity on data nodes and extending constraints to structural relationships. In this paper, we introduce a rewrite-based approach for access constraint enforcement, based on the ACXESS framework we developed at Indiana University. The ACXESS framework utilizes virtual security views and introduces a set of rewrite rules that takes advantage of the Security Annotated Schema (SAS) - an internal representation for virtual views. It is capable of rewriting user queries against security views into queries against the source data, while honoring the access constraints.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fan, W., Chan, C.Y., Garofalakis, M.: Secure XML querying with security views. In: SIGMOD (2004)

    Google Scholar 

  2. Finance, B., Medjdoub, S., Pucheral, P.: The case for access control on XML relationships. In: CIKM (2005)

    Google Scholar 

  3. Gabillon, A.: A formal access control model for XML databases. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  4. Yu, T., Srivastava, D., Lakshmanan, L.V.S., Jagadish, H.V.: Compressed accessibility map: Efficient access control for XML. In: Bressan, S., Chaudhri, A.B., Lee, M.L., Yu, J.X., Lacroix, Z. (eds.) CAiSE 2002 and VLDB 2002. LNCS, vol. 2590, Springer, Heidelberg (2003)

    Google Scholar 

  5. Mohan, S., Sengupta, A., Wu, Y.: Access control for XML - a dynamic query rewriting approach. In: CIKM (2005)

    Google Scholar 

  6. Mohan, S., Klinginsmith, J., Sengupta, A., Wu, Y.: Access control for XML with enhanced security specifications. In: ICDE (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bruno Apolloni Robert J. Howlett Lakhmi Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mohan, S., Sengupta, A., Wu, Y. (2007). A Rewrite Based Approach for Enforcing Access Constraints for XML. In: Apolloni, B., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2007. Lecture Notes in Computer Science(), vol 4694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74829-8_132

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74829-8_132

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74828-1

  • Online ISBN: 978-3-540-74829-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics