An Access Control Model for XML Repositories

Article Preview

Abstract:

The XML documents are nested and semi-structured, but the traditional access control mechanism is coarse-grained and not applicable. We proposed an XML access control model (XACM) for XML repository. The XACM provides a fine granular definition for XML authorizations, which is based on the self-description characteristic of XML. We also discuss how to use the XACM to automatically preserve the access control policy, when relational databases are published as XML documents. Finally, we present the implementation of the XACM in an actual XML publisher system. Comparing with existing related works, the XACM is more flexible, efficient and less overheads.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2360-2366

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Information on http: /www. w3. org/TR/Xpath.

Google Scholar

[2] J. Fong, F. Pang: Converting Relational Database into XML Document. In Proceedings of Database and Expert Systems Applications. 2001, P61 –65.

DOI: 10.1109/dexa.2001.953042

Google Scholar

[3] Information on http: /www. w3. org/Style/XSLT.

Google Scholar

[4] Information on http: /www. w3. org/DOM.

Google Scholar

[5] M. Kudo and S. Hada: XML Document Security Based on Provisional Authorization. In Proceedings of the 7th ACM Conference on Computer and Communication Security, 2000, P87-96.

DOI: 10.1145/352600.352613

Google Scholar

[6] C. Nentwich, L. Capra, W. Emmerich and A. Finkelstein: A Consistency Checking and Smart Link Generation Service. In ACM Transactions on Internet Technology, (2002).

DOI: 10.1145/514183.514186

Google Scholar

[7] R. Sandhu. Role-Based Access Control. In Advances in Computers. Vol 48. Academic Press. (1998).

Google Scholar

[8] E. Damiani: XML Access Control Systems: A Component-Based Approach. In Proceedings of IFIP WG11. 3 Working Conference on Database Security, 2000, P122-128.

Google Scholar

[9] R. Chandramouli: Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks, In Proceedings of the 5th ACM workshop on Role-based Access Control, 2000, P156-163.

DOI: 10.1145/344287.344297

Google Scholar

[10] V. Parmar: XML Access Control for Semantically Related XML Documents. In Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003, P288 –297.

DOI: 10.1109/hicss.2003.1174827

Google Scholar