Skip to main content

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6413))

Included in the following conference series:

  • 950 Accesses

Abstract

The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast gaining momentum in a diverse set of web applications. REST is stateless, as is HTTP on which it is built. For many applications, this not enough, especially in the context of concurrent access and the increasing need for auditing and accountability. We present a lightweight mechanism which allows the application to control the integrity of the underlying resources in a simple, yet flexible manner. Based on an opportunistic locking approach, we show in this paper that XML does not only act as an extensible and direct accessible backend that ensures easy modifications due to the allocation of nodes, but also gives scalable possibilities to perform on-the-fly integrity verification based on the tree structure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alvarez-Cavazos, F., Garcia-Sanchez, R., Garza-Salazar, D., Lavariega, J.C., Gomez, L.G., Sordia, M.: Universal access architecture for digital libraries. In: Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2005, pp. 12–28. IBM Press (2005)

    Google Scholar 

  2. Bray, T., Paoli, J., Sperberg-McQueen, C.M., Textuality, T.B.: Extensible markup language (xml) - version 1.0 (1997)

    Google Scholar 

  3. Cardone, R., Soroker, D., Tiwari, A.: Using xforms to simplify web programming. In: Proceedings of the 14th International Conference on World Wide Web, WWW 2005, pp. 215–224. ACM, New York (2005)

    Google Scholar 

  4. Carminati, B., Ferrari, E., Bertino, E.: Securing xml data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and knowledge Management, CIKM 2005, pp. 99–106. ACM, New York (2005)

    Google Scholar 

  5. Chamberlin, D., Florescu, D., Robie, J., et al.: XQuery update facility (2006)

    Google Scholar 

  6. Chi, C., Liu, L., Yu, X.: Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 328–335. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Hung Chi, C., Wu, Y.: An xml-based data integrity service model for web intermediaries. In: In Proc. 7th IWCW. pp. 14–16 (2002)

    Google Scholar 

  8. Clark, J., DeRose, S., et al.: XML path language (XPath) version 1.0 (1999)

    Google Scholar 

  9. Clark, J., et al.: XSL transformations (XSLT) version 1.0 (1999)

    Google Scholar 

  10. Fan, W., Libkin, L.: On xml integrity constraints in the presence of dtds. J. ACM 49(3), 368–406 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  11. Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California, Irvine (2000), chair-Taylor, Richard N

    Google Scholar 

  12. Giannakaras, G., Kramis, M.: Temporal REST—How to really exploit XML. In: IADIS International Conference WWW/Internet (2008)

    Google Scholar 

  13. Graf, S.: Treetank, a native xml storage. Tech. rep., Bibliothek der Universität Konstanz, Universitätsstr. 10, 78457 Konstanz (2009), http://kops.ub.uni-konstanz.de/volltexte/2010/10066

  14. Graf, S., Lewandowski, L., Gruen, C.: Jax-rx, unified rest access to xml resources. Tech. rep., Bibliothek der Universität Konstanz, Universitätsstr. 10, 78457 Konstanz (2010), http://kops.ub.uni-konstanz.de/volltexte/2010/12051

  15. Holupirek, A., Grün, C., Scholl, M.H.: Basex and deepfs joint storage for filesystem and database. In: Proceedings of the 12th International Conference on Extending Database Technology, EDBT 2009, pp. 1108–1111. ACM, New York (2009)

    Google Scholar 

  16. Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)

    Google Scholar 

  17. Olteanu, D., Meuss, H., Furche, T., Bry, F.: Symmetry in xpath. In: Proc. EDBT Workshop on XML Data Management (2002)

    Google Scholar 

  18. O’Neil, P., O’Neil, E., Pal, S., Cseri, I., Schaller, G., Westbury, N.: Ordpaths: insert-friendly xml node labels. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004, pp. 903–908. ACM, New York (2004)

    Google Scholar 

  19. Pautasso, C.: Bpel for rest. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 278–293. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  20. da Silva Maciel, L.A.H., Hirata, C.M.: An optimistic technique for transactions control using rest architectural style. In: Proceedings of the 2009 ACM Symposium on Applied Computing, SAC 2009, pp. 664–669. ACM, New York (2009)

    Chapter  Google Scholar 

  21. Wilde, E.: Putting things to REST. School of Information, UC Berkeley, Tech. Rep. UCB iSchool Report 15 (2007)

    Google Scholar 

  22. Yao, D., Koglin, Y., Bertino, E., Tamassia, R.: Decentralized authorization and data security in web content delivery. In: Proceedings of the 2007 ACM Symposium on Applied Computing, SAC 2007, pp. 1654–1661. ACM, New York (2007)

    Chapter  Google Scholar 

  23. Ziegeler, C.: Cocoon: Building XML Applications. Pearson Education, London (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Graf, S., Lewandowski, L., Waldvogel, M. (2010). Integrity Assurance for RESTful XML. In: Trujillo, J., et al. Advances in Conceptual Modeling – Applications and Challenges. ER 2010. Lecture Notes in Computer Science, vol 6413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16385-2_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16385-2_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16384-5

  • Online ISBN: 978-3-642-16385-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics