Skip to main content

Efficient Access Control for Secure XML Query Processing in Data Streams

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5141))

  • 1193 Accesses

Abstract

In this paper, we propose an efficient access control for secure XML query processing method to solve the problems using role-based prime number labeling and XML fragmentation. Recently XML has become an active research area. In particular, the need for an efficient secure access control method of XML data in a ubiquitous data streams environment has become very important. Medical records XML documents have the characteristic of an infinite addition in width rather than in depth because of the increment of patients. But the role-based prime number labeling method can fully manage the increase in the size of documents and can minimize the maintenance cost caused by dynamic changes. We have shown that our approach is an efficient and secure through experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. An, D.C., Park, S.: Efficient Secure Query Processing in XML Data Stream. IWKDUDS, Poland (2007)

    Google Scholar 

  2. Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. PODS (2002)

    Google Scholar 

  3. Berglund, A., Boag, S., Chamberlin, D., Fernández, M.F., Kay, M., Robie, J., Siméon, J.: XPath 2.0, World Wide Web Consortium (W3C) (2005)

    Google Scholar 

  4. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. WWW Journal 3(3) (2000)

    Google Scholar 

  5. Bertino, E., Castano, S., Ferrai, E.: Securing XML documents with Author-X. IEEE Internet Computing, 21-31 (May-June 2001)

    Google Scholar 

  6. Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. TISSEC 5(3), 237–260 (2002)

    Article  Google Scholar 

  7. Bose, S., Fegaras, L., Levine, D., Chaluvadi, V.: A Query Algebra for Fragmented XML Stream Data, DBLP (2003)

    Google Scholar 

  8. Bose, S., Fegaras, L.: XFrag: A Query Processing Framework for Fragmented XML Data. Web and Databases (2005)

    Google Scholar 

  9. Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C) (2004)

    Google Scholar 

  10. Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Document. EDBT, Konstan, Germany, March 2000, pp.121-135 (2000)

    Google Scholar 

  11. Damiani, E., Vimercati, S., Paraboachk, S., Samarati, P.: XML Access Control Systems: A Component-Based Approach. In: Proc. IFIP WG11.3 Working Conference on Database Security, Netherlands, 8 (2000)

    Google Scholar 

  12. Damiani, E., Vimercati, S., Paraboachk, S., Samarati, P.: A Fine-grained Access Control System for XML Documents. ACM Trans. Information and System Sec., 5(2) (May 2002)

    Google Scholar 

  13. Fan, W., Fundulaki, I., Geerts, F., Jia, X., Kementsietsidis, A.: A View Based Security Framework for XML, AHM (2006)

    Google Scholar 

  14. Fegaras, L., Levine, D., Bose, S., Chaluvadi, V.: Query Processing of Streamed XML Data. In: CIKM, pp. 126–133 (2002)

    Google Scholar 

  15. Gabillon, A., Bruno, E.: Regulating Access to XML Documents. IFIP WG11.3 Working Conference on Database Security (2001)

    Google Scholar 

  16. Huo, H., Wang, G., Hui, X., Zhou, R., Ning, B., Xiao, C.: Efficient Query Processing for Streamed XML Fragments. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Murata, M., Tozawa, A., Kudo, M.: XML Access Control Using Static Analysis. In: ACM CCS, Washington D.C (2003)

    Google Scholar 

  18. Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A Model of Authorization for Next-Generation Database Systems. ACM Transaction on Database Systems 126(1), 88–131 (1991)

    Article  Google Scholar 

  19. Stoica, A., Farkas, C.: Secure XML Views. In: Proc. IFIP WG11.3 Working Conference on Database and Application Security (2002)

    Google Scholar 

  20. Wu, X., Li, M., Hsu, L.W.: A Prime Number Labeling Scheme for Dynamic Ordered XML Trees. In: ICDE (2004)

    Google Scholar 

  21. Yoshikawa, M., Amagasa, T., et al.: XRel: A Path-Based Approach to Storage and Retrieval of XML Documents Using Relational Databases. ACM Transaction on Internet Technology (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

An, D.C., Park, S. (2008). Efficient Access Control for Secure XML Query Processing in Data Streams. In: Lopez, J., Hämmerli, B.M. (eds) Critical Information Infrastructures Security. CRITIS 2007. Lecture Notes in Computer Science, vol 5141. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89173-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89173-4_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89095-9

  • Online ISBN: 978-3-540-89173-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics