Advertisement

Efficient Access Control for Secure XML Query Processing in Data Streams

  • Dong Chan An
  • Seog Park
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5141)

Abstract

In this paper, we propose an efficient access control for secure XML query processing method to solve the problems using role-based prime number labeling and XML fragmentation. Recently XML has become an active research area. In particular, the need for an efficient secure access control method of XML data in a ubiquitous data streams environment has become very important. Medical records XML documents have the characteristic of an infinite addition in width rather than in depth because of the increment of patients. But the role-based prime number labeling method can fully manage the increase in the size of documents and can minimize the maintenance cost caused by dynamic changes. We have shown that our approach is an efficient and secure through experiments.

Keywords

Access Control Query Processing Mobile Terminal Access Control Policy Ubiquitous Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    An, D.C., Park, S.: Efficient Secure Query Processing in XML Data Stream. IWKDUDS, Poland (2007)Google Scholar
  2. 2.
    Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and Issues in Data Stream Systems. PODS (2002)Google Scholar
  3. 3.
    Berglund, A., Boag, S., Chamberlin, D., Fernández, M.F., Kay, M., Robie, J., Siméon, J.: XPath 2.0, World Wide Web Consortium (W3C) (2005)Google Scholar
  4. 4.
    Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. WWW Journal 3(3) (2000)Google Scholar
  5. 5.
    Bertino, E., Castano, S., Ferrai, E.: Securing XML documents with Author-X. IEEE Internet Computing, 21-31 (May-June 2001)Google Scholar
  6. 6.
    Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. TISSEC 5(3), 237–260 (2002)CrossRefGoogle Scholar
  7. 7.
    Bose, S., Fegaras, L., Levine, D., Chaluvadi, V.: A Query Algebra for Fragmented XML Stream Data, DBLP (2003)Google Scholar
  8. 8.
    Bose, S., Fegaras, L.: XFrag: A Query Processing Framework for Fragmented XML Data. Web and Databases (2005)Google Scholar
  9. 9.
    Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C) (2004)Google Scholar
  10. 10.
    Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P.: Securing XML Document. EDBT, Konstan, Germany, March 2000, pp.121-135 (2000)Google Scholar
  11. 11.
    Damiani, E., Vimercati, S., Paraboachk, S., Samarati, P.: XML Access Control Systems: A Component-Based Approach. In: Proc. IFIP WG11.3 Working Conference on Database Security, Netherlands, 8 (2000)Google Scholar
  12. 12.
    Damiani, E., Vimercati, S., Paraboachk, S., Samarati, P.: A Fine-grained Access Control System for XML Documents. ACM Trans. Information and System Sec., 5(2) (May 2002)Google Scholar
  13. 13.
    Fan, W., Fundulaki, I., Geerts, F., Jia, X., Kementsietsidis, A.: A View Based Security Framework for XML, AHM (2006)Google Scholar
  14. 14.
    Fegaras, L., Levine, D., Bose, S., Chaluvadi, V.: Query Processing of Streamed XML Data. In: CIKM, pp. 126–133 (2002)Google Scholar
  15. 15.
    Gabillon, A., Bruno, E.: Regulating Access to XML Documents. IFIP WG11.3 Working Conference on Database Security (2001)Google Scholar
  16. 16.
    Huo, H., Wang, G., Hui, X., Zhou, R., Ning, B., Xiao, C.: Efficient Query Processing for Streamed XML Fragments. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol. 3882. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  17. 17.
    Murata, M., Tozawa, A., Kudo, M.: XML Access Control Using Static Analysis. In: ACM CCS, Washington D.C (2003)Google Scholar
  18. 18.
    Rabitti, F., Bertino, E., Kim, W., Woelk, D.: A Model of Authorization for Next-Generation Database Systems. ACM Transaction on Database Systems 126(1), 88–131 (1991)CrossRefGoogle Scholar
  19. 19.
    Stoica, A., Farkas, C.: Secure XML Views. In: Proc. IFIP WG11.3 Working Conference on Database and Application Security (2002)Google Scholar
  20. 20.
    Wu, X., Li, M., Hsu, L.W.: A Prime Number Labeling Scheme for Dynamic Ordered XML Trees. In: ICDE (2004)Google Scholar
  21. 21.
    Yoshikawa, M., Amagasa, T., et al.: XRel: A Path-Based Approach to Storage and Retrieval of XML Documents Using Relational Databases. ACM Transaction on Internet Technology (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Dong Chan An
    • 1
  • Seog Park
    • 1
  1. 1.Department of Computer Science & EngineeringSogang UniversitySeoulKorea

Personalised recommendations