Skip to main content

Light-Weight Access Control Scheme for XML Data

  • Conference paper
Knowledge-Based and Intelligent Information and Engineering Systems (KES 2010)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 6277))

  • 1574 Accesses

Abstract

In this paper, an adaptable light-weight access control scheme is proposed for an evolutionary computing environment. The existing access control environment relies on the server to solve security problems. The current environment has become almost distributed and ubiquitous. This change has spawned the need for light-weight access control by clients, which have a resource-limited environment. Existing studies using role-based prime number labeling (RPNL) are limited by the scalability of the prime number. The problem of scalability of the prime number was addressed with the use of the strong point of RPNL and implementation of persistent XML labeling and efficient query processing. The proposal has the advantage of having an adaptable access control scheme for an existing XML labeling method. We showed the efficiency of the proposed approach through experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. An, D.C., Park, S.: Access Control Labeling Scheme for Efficient Secure XML Query Processing. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part II. LNCS (LNAI), vol. 5178, pp. 346–353. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and Enforcing Access Control Policies for XML Document Sources. WWW Journal (2000)

    Google Scholar 

  3. Bertino, E., Ferrari, E.: Secure and Selective Dissemination of XML Documents. TISSEC 5(3) (2002)

    Google Scholar 

  4. Bouganim, L., Ngoc, F.D., Pucheral, P.: Client-Based Access Control Management for XML Documents. In: Proceedings of the 30th International Conference on Very Large Data Bases, pp. 84–95 (2004)

    Google Scholar 

  5. Cai, J., Poon, C.K.: OrdPathX: Supporting Two Dimensions of Node Insertion in XML Data. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) Database and Expert Systems Applications. LNCS, vol. 5690, pp. 332–339. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  6. Damiani, E., Vimercati, S., et al.: Securing XML Document. In: Zaniolo, C., Grust, T., Scholl, M.H., Lockemann, P.C. (eds.) EDBT 2000. LNCS, vol. 1777, p. 121. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Damiani, E., Vimercati, S., et al.: A Fine-grained Access Control System for XML Documents. ACM Trans. Information and System Security 5(2) (2002)

    Google Scholar 

  8. Damiani, E., Fansi, M., Gabillon, A., Marrara, S.: A general approach to securely querying XML. Computer Standards & Interfaces 30(6), 379–389 (2008)

    Article  Google Scholar 

  9. Duong, M., Zhang, Y.: LSDX: A new Labeling Scheme for Dynamically Updating XML Data. In: Australasian Database Conference (2005)

    Google Scholar 

  10. Fan, W., Fundulaki, I., Geerts, F., Jia, X., Kementsietsidis, A.: A View Based Security Framework for XML. In: AHM (2006)

    Google Scholar 

  11. Kim, J.Y., Park, S.M., Park, S.: A New Labeling Scheme without Re-labeling Using Circular Concepts for Dynamic XML Data. In: Proceeding of CIT (1), pp. 318–323 (2009)

    Google Scholar 

  12. Liang, W., Takahashi, A., Yokota, H.: A Low-Storage-Consumption XML Labeling Method for Efficient Structural Information Extraction. In: Bhowmick, S.S., Küng, J., Wagner, R. (eds.) Database and Expert Systems Applications. LNCS, vol. 5690, pp. 7–22. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  13. Lu, J., Wang Ling, T.: Labeling and Querying Dynamic XML Trees. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol. 3007, pp. 180–189. Springer, Heidelberg (2004)

    Google Scholar 

  14. Luo, B., Lee, D.W., Lee, W.C., Liu, P.: Qfilter: Fine-grained Run-Time XML Access Control via NFA-based Query Rewriting. In: CIKM 2004, pp. 543–552 (2004)

    Google Scholar 

  15. Murata, M., Tozawa, A., Kudo, M.: XML Access Control Using Static Analysis. In: ACM CCS, New York, pp. 73–84 (2003)

    Google Scholar 

  16. O’Neil, P., O’Neil, e., et al.: ORDPATHs: Insert-Friendly XML Node Labels. In: Proceeding of the SIGMOD, pp. 903–908 (2004)

    Google Scholar 

  17. Sans, V., Laurent, D.: Prefix Based Numbering Schemes for XML: Techniques, Applications and Performances. In: Proceedings of the 34th International Conference on Very Large Data Bases, pp. 1564–1573 (2008)

    Google Scholar 

  18. Schmidt, A., Waas, F., Kersten, M., Carey, M.J., Manolescu, I., Busse, R.: XMark: a benchmark for XML data management. In: VLDB (2002)

    Google Scholar 

  19. Wu, X., Li, M., Hsu, L.: A Prime Number Labeling Scheme for Dynamic Ordered XML Trees. In: ICDE (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

An, D., Kim, H., Park, S. (2010). Light-Weight Access Control Scheme for XML Data. In: Setchi, R., Jordanov, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2010. Lecture Notes in Computer Science(), vol 6277. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15390-7_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15390-7_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15389-1

  • Online ISBN: 978-3-642-15390-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics