skip to main content
10.1145/508791.509006acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An authorization model for temporal XML documents

Published:11 March 2002Publication History

ABSTRACT

We here describe an access control model for securing temporal XML document. Our approach is based on a temporal data model allowing to represent both transactional and valid time dimensions of XML documents. The authorization model allows the specification of temporal conditions on the two considered time dimensions and on the validity of the authorizations.

References

  1. T. Amagasa, M. Yoshikawa, and S. Uemura. A Data Model for Temporal XML Documents. In Proc. of the 11th Int'l Conference and Workshop on Database and Expert Systems Applications, September 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Bonatti, E. Damiani, S. De Capitani di Vimercati, and P. Samarati. A Component-based Architecture for Secure Data Publication. In Proc. of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, December 2001. (to appear).]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. T. Bray, J. Paoli, C. Sperberg-McQueen, and E. Maler. Extensible Markup Language (XML) 1.0 (Second Edition). World Wide Web Consortium (W3C), October 2000. http://www.w3.org/TR/REC-xml.]]Google ScholarGoogle Scholar
  4. S. Ceri, S. Comai, E. Damiani, P. Fraternali, S. Paraboschi, and L. Tanca. XML-GL: a Graphical Language for Querying and Restructuring XML Documents. Computer Networks, 31(11-16):1171-1187, May 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Chawathe, S. Abiteboul, and J. Widom. Representing and Querying Changes in Semistructured Data. In Proc. of the Fourteenth Int'l Conference on Data Engineering, February 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Clark and S. DeRose. XML Path Language (XPath) Version 1.O, November 1999. http://www.w3.org/TR/xpath.]]Google ScholarGoogle Scholar
  7. J. Clifford, C. Dyreson, T. Isakowitz, C. Jensen, and R. Snodgrass. On the Semantics of "NOW" in Databases. ACM Transactions on Database Systems, 22(2):171-214, December 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Clifford and A. Tansel. On an Algebra for Historical Relational Databases: Two Views. In Proc. of the ACM SIGMOD, May 1985.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Design and implementation of an access control processor for XML documents. Computer Networks, 33(1-6):59-75, June 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Securing XML Documents. In Proc. of the 2000 Int'l Conference on Extending Database Technology, March 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Elmasri, G. Wuu, and Y. Kim. The Time Index --- An Access Structure for Temporal Data. In Proc. of the Int'l Conference on Very Large Databases, August 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Gadia. The Role of Temporal Elements in Temporal Databases. Data Engineering Bulletin, 11(4): 19-25, December 1988.]]Google ScholarGoogle Scholar
  13. A. Gal and V. Atluri. An Authorization Model for Temporal Data. In Proc.of the 7th ACM Conference on Computer and Communication Security, November 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Gal, O. Etzion, and A. Segev. Representation of Highly-Complex Knowledge in a Database. Journal of Intelligent Information Systems, 3(2):185-203, April 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. R. Goldman, J. McMugh, and J. Widom. From Semistructured Data to XML: Migrating the Lore Data Model and the Query Language. In Proc. of the 2nd Int'l Workshop on the Web and Databases, June 1999.]]Google ScholarGoogle Scholar
  16. F. Grandi and F. Mandreoli. The Valid Web: An XML/XSL Infrastructure for Temporal Management of Web Documents. In Proc. of the Int'l Conference on Advances in Information Systems, October 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Kudo and S. Hada. XML Document Security based on Provisional Authorization. In Proc. of the 7th ACM Conference on Computer and Communication Security, November 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. O. Lassila and R. Swick. Resource Description Framework (RDF) Model and Syntax. World Wide Web Consortium (W3C), February 1999 http://www.w3.org/TR/REC-rdf-syntax.]]Google ScholarGoogle Scholar
  19. B. Oliboni, E. Quintarelli, and L. Tanca. Temporal Aspects of Semistructured Data. In Proc. of the Eight Int'l Symposium on Temporal Representation and Reasoning, June 2001.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Snodgrass and I. Ahn. Temporal Databases. IEEE Computer, 19(9):35-42, September 1986.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Tansel, J. Clifford, V. Gadia, S. Jajodia, A. Segev, and R. Snodgrass, editors. Temporal Databases: Theory, Design, and Implementation. Benjamin/Cummings Publishing Company, Redwood City, California, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. M. Wolf and C. Wicksteed. Date and Time Formats, September 1997. http://www.w3.org/TR/NOTE-datetime.]]Google ScholarGoogle Scholar

Index Terms

  1. An authorization model for temporal XML documents

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
          March 2002
          1200 pages
          ISBN:1581134452
          DOI:10.1145/508791

          Copyright © 2002 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 March 2002

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader