Abstract
Access control for semi-structured data is nontrivial, as witnessed by the number of access control approaches in literature. Recently, a case has been made for expressing access constraints at finer levels of granularity on data nodes and extending constraints to structural relationships. In this paper, we introduce a rewrite-based approach for access constraint enforcement, based on the ACXESS framework we developed at Indiana University. The ACXESS framework utilizes virtual security views and introduces a set of rewrite rules that takes advantage of the Security Annotated Schema (SAS) - an internal representation for virtual views. It is capable of rewriting user queries against security views into queries against the source data, while honoring the access constraints.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Fan, W., Chan, C.Y., Garofalakis, M.: Secure XML querying with security views. In: SIGMOD (2004)
Finance, B., Medjdoub, S., Pucheral, P.: The case for access control on XML relationships. In: CIKM (2005)
Gabillon, A.: A formal access control model for XML databases. In: Jonker, W., Petković, M. (eds.) SDM 2005. LNCS, vol. 3674, Springer, Heidelberg (2005)
Yu, T., Srivastava, D., Lakshmanan, L.V.S., Jagadish, H.V.: Compressed accessibility map: Efficient access control for XML. In: Bressan, S., Chaudhri, A.B., Lee, M.L., Yu, J.X., Lacroix, Z. (eds.) CAiSE 2002 and VLDB 2002. LNCS, vol. 2590, Springer, Heidelberg (2003)
Mohan, S., Sengupta, A., Wu, Y.: Access control for XML - a dynamic query rewriting approach. In: CIKM (2005)
Mohan, S., Klinginsmith, J., Sengupta, A., Wu, Y.: Access control for XML with enhanced security specifications. In: ICDE (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohan, S., Sengupta, A., Wu, Y. (2007). A Rewrite Based Approach for Enforcing Access Constraints for XML. In: Apolloni, B., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2007. Lecture Notes in Computer Science(), vol 4694. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74829-8_132
Download citation
DOI: https://doi.org/10.1007/978-3-540-74829-8_132
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74828-1
Online ISBN: 978-3-540-74829-8
eBook Packages: Computer ScienceComputer Science (R0)