Abstract
Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restricting access to data by certain users. This can, for example, be achieved by means of access rules or XML security views, which define projections over XML documents. The usage of security views avoids information leakage that may occur when we use certain access rules. XML views can be implemented by materialized views, but materialization and maintenance of views may cause considerable overhead. Therefore, we study translations from queries on views to equivalent queries on the original XML documents, assuming both the security views and the queries are specified by XPath expressions. Especially, we investigate which XPath fragments are closed under the composition of a view and a query.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Benedikt, M., Fan, W., Kuper, G.M.: Structural properties of xPath fragments. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 79–95. Springer, Heidelberg (2002)
Benedikt, M., Fundulaki, I.: XML subtree queries: Specification and composition. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol. 3774, pp. 138–153. Springer, Heidelberg (2005)
Berglund, A., Boag, S., Chamberlin, D., Fernández, M., Kay, M., Robie, J., Siméon, J.: XML path language (XPath) 2.0, W3C working draft (2005), http://www.w3.org/TR/xpath20
Bertino, E., Ferrari, E.: Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur. 5(3), 290–331 (2002)
Draper, D., Frankhauser, P., Fernández, M., Malhotra, A., Rose, K., Rys, M., Siméon, J., Wadler, P.: XQuery 1.0 and XPath 2.0 formal semantics. W3C Working Draft (2005)
Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: SIGMOD Conference, pp. 587–598 (2004)
Fernández, M., Malhotra, A., Marsh, J., Nagy, M., Walsh, N.: XQuery 1.0 and XPath 2.0 data model (XDM) (2005), http://www.w3.org/TR/xpath-datamodel/
Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: SACMAT 2004, pp. 61–69 (2004)
Godik, S., Moses, T. (eds.): eXtensible Access Control Markup Language (XACML) Version 1.0. (February 2003)
Gottlob, G., Koch, C., Pichler, R.: The complexity of XPath query evaluation. In: PODS 2003, San Diego, California, pp. 179–190 (2003)
Kudo, M., Hada, S.: XML access control, http://www.trl.ibm.com/projects/xml/xacl/
Kuper, G., Fabio, M., Nataliya, R.: Generalized XML security views. In: SACMAT 2005, pp. 77–84 (2005)
Murata, M., Tozawa, A., Kudo, M., Hada, S.: XML access control using static analysis. In: CCS, pp. 73–84 (2003)
Stoica, A., Farkas, C.: Secure XML views. In: Gudes, E., Shenoi, S. (eds.) DBSec. IFIP Conference Proceedings, vol. 256, pp. 133–146. Kluwer, Dordrecht (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Vercammen, R., Hidders, J., Paredaens, J. (2006). Query Translation for XPath-Based Security Views. In: Grust, T., et al. Current Trends in Database Technology – EDBT 2006. EDBT 2006. Lecture Notes in Computer Science, vol 4254. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11896548_22
Download citation
DOI: https://doi.org/10.1007/11896548_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-46788-5
Online ISBN: 978-3-540-46790-8
eBook Packages: Computer ScienceComputer Science (R0)