Skip to main content

Optimizing Tree Pattern Queries over Secure XML Databases

  • Chapter
Secure Data Management in Decentralized Systems

Part of the book series: Advances in Information Security ((ADIS,volume 33))

  • 630 Accesses

Abstract

The rapid emergence of XML as a standard for data representation and exchange over the Web has sparked considerable interest in models and efficient mechanisms for controlled access, especially using queries, to information represented in XML (see, e.g., [3],[5]–[7],[11]–[13],[31]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Martin Abadi and Bogdan Warinschi. Security analysis of cryptographically controlled access to xml documents. Symposium on Principles of Database Systems(PODS), 2005.

    Google Scholar 

  2. Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwaihara, and Yahiko Kambayashi Vilas Wuwongse. A rule-based xml access control model. International Conference on Rules and Rule Markup Languages for the Semantic Web(RuleML), 2003.

    Google Scholar 

  3. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, and Marco Mesiti. Authorx: A java-based system for xml data protection. IFIP Working Conf. Database Security, 2000.

    Google Scholar 

  4. Elisa Bertino, Silvana Castano, and Elena Ferrari. On specifying security policies for web documents with an xml-based language. ACM Symposium on Access Control Models and Technologies (SACMAT), 2001.

    Google Scholar 

  5. Elisa Bertino, Silvana Castano, and Elena Ferrari. Securing xml documents with author-x. IEEE Internet Computing, 2001.

    Google Scholar 

  6. Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Controlled access and dissemination of xml documents. Workshop on Web Information and Data Management, 1999.

    Google Scholar 

  7. Elisa Bertino, Silvana Castano, Elena Ferrari, and Marco Mesiti. Specifying and enforcing access control policies for xml document sources. World Wide Web Journal, 2000.

    Google Scholar 

  8. Elisa Bertino and Elena Ferrari. Secure and selective dissemination of xml documents. ACM Transactions on Information and System Security (TISSEC), 2002.

    Google Scholar 

  9. Biomedical database, http://www.cs.washington.edu/-research/xmldatasets/www/repository.html.

    Google Scholar 

  10. Luc Bouganim, Francois Dang Ngoc, and Philippe Pucheral. Client-based access control management for xml documents. Very Large Database (VLDB), 2004.

    Google Scholar 

  11. SungRan Cho, Sihem Amer-Yahia, Laks V. S. Lakshmanan, and Divesh Srivastava. Optimizing the secure evaluation of twig queries. Very Large Database (VLDB), 2002.

    Google Scholar 

  12. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Design and implementation of an access control processor for xml documents. Computer Networks, 2000.

    Google Scholar 

  13. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Securing xml documents. International Conference on Extending Database Technology(EDBT), 2000.

    Google Scholar 

  14. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. Xml access control systems: A component-based approach. Informatica, 2002.

    Google Scholar 

  15. Wenfei Fan, Chee Yong Chan, and Minos N. Garofalakis. Secure xml querying with security views. Special Interest Group on Management of Data(SIGMOD), 2004.

    Google Scholar 

  16. Irini Fundulaki and Maarten Marx. Specifying access control policies for xml documents with xpath. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.

    Google Scholar 

  17. Abhilash Gummadi, Jong P. Yoon, Biren Shah, and Vijay Raghavan. A bitmap-based access control for restricted views of xml documents. ACM Workshop on XML Security, 2003.

    Google Scholar 

  18. IBM XML generator, http://www.alphaworks.ibm.com/tech/xmlgenerator.

    Google Scholar 

  19. Michiharu Kudo and Satoshi Hada. Xml document security based on provisional authorization. ACM Conf. Computer and Communications Security, 2000.

    Google Scholar 

  20. Gabriel Kuper, Fabio Massacci, and Nataliya Rassadko. Generalized xml security views. ACM Symposium on Access Control Models and Technologies (SACMAT), 2005.

    Google Scholar 

  21. Bo Luo, Dongwon Lee, Wang-Chien Lee, and Peng Liu. Qfilter: Fine-grained run-time xml access control via nfa-based query rewriting. Conference on Information and Knowledge Management(CIKM), 2004.

    Google Scholar 

  22. Gerome Miklau and Dan Suciu. Containment and equivalence for an xpath fragment. Symposium on Principles of Database Systems(PODS), 2002.

    Google Scholar 

  23. Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. Very Large Database (VLDB), 2003.

    Google Scholar 

  24. Makoto Murata, Akihiko Tozawa, and Michiharu Kudo. Xml access control using static analysis. ACM Conference on Computer and Communications Security (CCS), 2003.

    Google Scholar 

  25. United States Government Bills, http://xml.house.gov.

    Google Scholar 

  26. Hui Wang, Divesh Srivastava, Laks V.S. Lakshmanan, SungRan Cho, and Sihem Amer-Yahia. Optimizing tree pattern queries over secure xml databases: Full paper. http://www.cs.ubc.ca/~hwang/accesscontrol/proof.pdf, 2005.

    Google Scholar 

  27. Jingzhu Wang and Sylvia L. Osborn. A role-based approach to access control for xml databases. ACM Symposium on Access Control Models and Technologies (SACMAT), 2004.

    Google Scholar 

  28. Peter Wood. Containment for xpath fragments under dtd constraints. International Conference on Database Theory(ICDT), 2003.

    Google Scholar 

  29. XALAN, http://xml.apache.org.

    Google Scholar 

  30. XMark, http://monetdb.cwi.nl/xml/.

    Google Scholar 

  31. Ting Yu, Divesh Srivastava, Laks V.S. Lakshmanan, and H. V. Jagadish. A compressed accessibility map for xml. ACM Transactions on Database Systems, 2004.

    Google Scholar 

  32. Huaxin Zhang, Ning Zhang, Kenneth Salem, and Donghui Zhuo. Compact access control labeling for efficient secure xml query evaluation. International Workshop on XML Schema and Data Management(XSDM), 2005.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Wang, H., Srivastava, D., Lakshmanan, L.V.S., Cho, S., Amer-Yahia, S. (2007). Optimizing Tree Pattern Queries over Secure XML Databases. In: Yu, T., Jajodia, S. (eds) Secure Data Management in Decentralized Systems. Advances in Information Security, vol 33. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-27696-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-27696-0_5

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-27694-6

  • Online ISBN: 978-0-387-27696-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics