[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/968559.968569acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A bitmap-based access control for restricted views of XML documents

Published: 31 October 2003 Publication History

Abstract

The information on the web is growing at a very fast pace. In this ever-accumulating data, the volume of information represented in XML format is on the rise in recent times. An organization that puts forth its information on the web in XML format has several issues to take into account such as limiting the view of intended audience to only relevant portions of the documents. To address this problem, we propose the concept of "Restricted views" to implement security in XML documents. This could be accomplished by defining "Access control" for the users trying to access the system. In this paper, we describe a bitmap-based approach to represent access control in XML documents. We also introduce a new three-dimensional bitmap called security cube, which efficiently represents access control on XML documents at their finest level of granularity.

References

[1]
S. Abiteboul, P. Buneman, D. Suciu, "Data on the Web: From Relations to Semi-structured Data and XML", Morgan Kaufmann, 1999.]]
[2]
M. Acevedo, D. Fillingham, J. Nicolettos, "Enterprise Security Applications of Partition Rule Based Access Control"; In Proceedings of the 6th IEEE Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 285--292, 1997.]]
[3]
V. Aguilera, S. Cluet, T. Milo, P. Veltri, D. Vodislav, "Views in a Large-Scale XML Repository", In VLDB Journal pp. 238--255, Vol. 11, No. 3, 2002.]]
[4]
E. Bertino, S. Castano, E. Ferrari, M. Mesiti, "Specifying and Enforcing Access Control Policies for XML Document Sources", World Wide Web, pp. 139--151, Vol. 3, 2000.]]
[5]
E. Bertino, E. Ferrari, "Secure and Selective Dissemination of XML Documents, In ACM Transactions on Information and System Security, pp. 290--331, Vol. 5, No. 3, 2002.]]
[6]
C. Chan, Y. Ioannidis. "Bitmap Index Design and Evaluation", In Proceedings of the International ACM SIGMOD Conference, pp. 355--366, 1998.]]
[7]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "A Fine Grained Access Control for XML Docments" In ACM Transactions on Information and System Security, pp. 169--202, Vol. 5, No. 2, 2002.]]
[8]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Controlling Access to XML Documents," In IEEE Internet Computing, pp. 18--28, Vol. 5, No. 6, 2001.]]
[9]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "Securing XML Documents," in Proc. of the 2000 International Conference on Extending Database Technology, Konstanz, Germany, 2000.]]
[10]
Intellor Group Inc., "XML Adoption: Benefits and Challenges", Intellor Research Summary, 2001.]]
[11]
G. Myers, "Becoming Bit Wise", http://www.elitecoders.de/mags/cscene/CS9/CS9--02.html, Date: 12th July 1998, Time: 9: 39 p.m.]]
[12]
V. Parmar, S. Hongchi, S Chen, "XML Access Control for Semantically Related XML Documents", In Proceedings of the 36th Annual Hawaii International Conference, pp. 288--297, 2003.]]
[13]
X. Qian, T. Lunt, "A MAC Policy Framework for Multilevel Relational Databases", In IEEE Transactions on Knowledge and Data Engineering, pp. 3--15, Vol. 8, No. 1, 1996.]]
[14]
R. Ramakrishnan, J. Gehrke, "Database Management Systems", McGraw-Hill, 2000.]]
[15]
R. Sandhu, E. Coyne, H. Feinstein, C. Youman, "Role-Based Access Control Models", In IEEE Computer, pp. 38--47, Vol. 29, No. 2, 1996.]]
[16]
R. Sandhu, "Lattice-Based Access Control Models", In IEEE Computer, pp. 9--19, Vol. 26, No. 11, 1993.]]
[17]
M. Wu, "Query Optimization for Selections using Bitmaps", In Proceedings of International ACM SIGMOD Conference, pp. 227--238, 1999.]]
[18]
J. Yoon, V. Raghavan, V. Chakilam, L. Kerschberg, "BitCube: A Three-Dimensional Bitmap Indexing for XML Documents", In Journal of Intelligent Information Systems, pp. 241--254, Vol. 17, 2001.]]
[19]
J. Yoon, "Bitmap-based High-speed Access Control for XML Documents", in the Seventeenth Annual Conference on Database and Applications Security, Colorado, 2003.]]

Cited By

View all
  • (2013)XML Retrieval with Results Clustering on AndroidAdvanced Materials Research10.4028/www.scientific.net/AMR.756-759.1300756-759(1300-1303)Online publication date: Sep-2013
  • (2009)An XML based access control architecture for pervasive computingProceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications10.1109/PERCOM.2009.4912894(1-6)Online publication date: 9-Mar-2009
  • (2007)A configurable access control system for networked manufacturing monitoring using XMLThe International Journal of Advanced Manufacturing Technology10.1007/s00170-007-1292-539:11-12(1252-1261)Online publication date: 27-Nov-2007
  • Show More Cited By

Index Terms

  1. A bitmap-based access control for restricted views of XML documents

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    XMLSEC '03: Proceedings of the 2003 ACM workshop on XML security
    October 2003
    126 pages
    ISBN:158113777X
    DOI:10.1145/968559
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 31 October 2003

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. XML
    2. access control
    3. bitmap
    4. restricted views
    5. security
    6. security cube

    Qualifiers

    • Article

    Conference

    CCS03
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 31 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2013)XML Retrieval with Results Clustering on AndroidAdvanced Materials Research10.4028/www.scientific.net/AMR.756-759.1300756-759(1300-1303)Online publication date: Sep-2013
    • (2009)An XML based access control architecture for pervasive computingProceedings of the 2009 IEEE International Conference on Pervasive Computing and Communications10.1109/PERCOM.2009.4912894(1-6)Online publication date: 9-Mar-2009
    • (2007)A configurable access control system for networked manufacturing monitoring using XMLThe International Journal of Advanced Manufacturing Technology10.1007/s00170-007-1292-539:11-12(1252-1261)Online publication date: 27-Nov-2007
    • (2007)Optimizing Tree Pattern Queries over Secure XML DatabasesSecure Data Management in Decentralized Systems10.1007/978-0-387-27696-0_5(127-165)Online publication date: 2007

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media