Skip to main content

Inter-node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels

  • Conference paper
E-Business and Telecommunication Networks (ICETE 2006)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 9))

Included in the following conference series:

  • 491 Accesses

Abstract

Most work on XML access control considers XML nodes as the smallest protection unit. This paper shows the limitation of this approach and introduces an XML access control mechanism that protects inter-node relationships. Our approach provides a finer granularity of access control than the node-based approaches(i.e., more expressive). Moreover, our approach helps achieve the “need-to-know” security principle and the “choice” privacy principle. This paper also shows how our approach can be implemented using a generic label infrastructure and suggests algorithms to create/check a secure set of labeled relationships in an XML document.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertino, E., Ferrari, E.: Secure and selective dissemination of xml documents. ACM Trans. Inf. Syst. Secur. 5, 290–331 (2002)

    Article  Google Scholar 

  2. Damiani, E., de C. di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for xml documents. ACM Trans. Inf. Syst. Secur. 5, 169–202 (2002)

    Article  Google Scholar 

  3. Fan, W.F., Chan, C.Y., Garofalakis, M.N.: Secure xml querying with security views. In: SIGMOD, pp. 587–598 (2004)

    Google Scholar 

  4. Gabillon, A., Bruno, E.: Regulating access to xml documents. In: Working Conference on Database and Application Security, pp. 311–328 (2001)

    Google Scholar 

  5. Kanza, Y., Mendelzon, A.O., Miller, R., Zhang, Z.: Authorization-transparent access control for xml under the non-truman model. In: EDBT, pp. 222–239 (2006)

    Google Scholar 

  6. Murata, M., Tozawa, A., Kudo, M., Hada, S.: Xml access control using static analysis. In: CCS, pp. 73–84. ACM Press, New York (2003)

    Google Scholar 

  7. Fundulaki, I., Marx, M.: Specifying access control policies for xml documents with xpath. In: SACMAT, pp. 61–69 (2004)

    Google Scholar 

  8. Miklau, G., Suciu, D.: Controlling access to published data using cryptography. In: VLDB, pp. 898–909 (2003)

    Google Scholar 

  9. Bertino, E., Castano, S., Ferrari, E.: On specifying security policies for web documents with an xml-based language. In: SACMAT, pp. 57–65 (2001)

    Google Scholar 

  10. Finance, B., Medjdoub, S., Pucheral, P.: The case for access control on xml relationships. Technical report, INRIA (2005), http://www-smis.inria.fr/dataFiles/FMP05a.pdf

  11. Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.: Xml-based specification for web services document security. IEEE Computer 4(37), 41–49 (2004)

    Google Scholar 

  12. Wang, J.Z., Osborn, S.L.: A role-based approach to access control for xml databases. In: SACMAT, pp. 70–77 (2004)

    Google Scholar 

  13. IBM: Xml access control (2001), http://xml.coverpages.org/xacl.html

  14. Oasis.: Oasis exensible access control markup language (xacml 2.0) (2005), http://www.oasis-open.org/committees/xacml

  15. Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: SIGMOD, pp. 551–562 (2004)

    Google Scholar 

  16. Clark, J., DeRose, S.: XML Path Language (XPath) version 1.0 (1999), http://www.w3.org/TR/xpath

  17. Rjaibi, W., Bird, P.: A multi-purpose implementation of mandatory access control in relational database management systems. In: VLDB, pp. 1010–1020 (2004)

    Google Scholar 

  18. Motro, A.: An access authorization model for relational databases based on algebraic manipulation of view definitions. In: ICDE, 1989, pp. 339–347 (1989)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Joaquim Filipe Mohammad S. Obaidat

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Z., Rjaibi, W. (2008). Inter-node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels. In: Filipe, J., Obaidat, M.S. (eds) E-Business and Telecommunication Networks. ICETE 2006. Communications in Computer and Information Science, vol 9. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-70760-8_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-70760-8_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-70759-2

  • Online ISBN: 978-3-540-70760-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics