Abstract
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast gaining momentum in a diverse set of web applications. REST is stateless, as is HTTP on which it is built. For many applications, this not enough, especially in the context of concurrent access and the increasing need for auditing and accountability. We present a lightweight mechanism which allows the application to control the integrity of the underlying resources in a simple, yet flexible manner. Based on an opportunistic locking approach, we show in this paper that XML does not only act as an extensible and direct accessible backend that ensures easy modifications due to the allocation of nodes, but also gives scalable possibilities to perform on-the-fly integrity verification based on the tree structure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alvarez-Cavazos, F., Garcia-Sanchez, R., Garza-Salazar, D., Lavariega, J.C., Gomez, L.G., Sordia, M.: Universal access architecture for digital libraries. In: Proceedings of the 2005 Conference of the Centre for Advanced Studies on Collaborative Research, CASCON 2005, pp. 12–28. IBM Press (2005)
Bray, T., Paoli, J., Sperberg-McQueen, C.M., Textuality, T.B.: Extensible markup language (xml) - version 1.0 (1997)
Cardone, R., Soroker, D., Tiwari, A.: Using xforms to simplify web programming. In: Proceedings of the 14th International Conference on World Wide Web, WWW 2005, pp. 215–224. ACM, New York (2005)
Carminati, B., Ferrari, E., Bertino, E.: Securing xml data in third-party distribution systems. In: Proceedings of the 14th ACM International Conference on Information and knowledge Management, CIKM 2005, pp. 99–106. ACM, New York (2005)
Chamberlin, D., Florescu, D., Robie, J., et al.: XQuery update facility (2006)
Chi, C., Liu, L., Yu, X.: Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries. In: Sha, E., Han, S.-K., Xu, C.-Z., Kim, M.-H., Yang, L.T., Xiao, B. (eds.) EUC 2006. LNCS, vol. 4096, pp. 328–335. Springer, Heidelberg (2006)
Hung Chi, C., Wu, Y.: An xml-based data integrity service model for web intermediaries. In: In Proc. 7th IWCW. pp. 14–16 (2002)
Clark, J., DeRose, S., et al.: XML path language (XPath) version 1.0 (1999)
Clark, J., et al.: XSL transformations (XSLT) version 1.0 (1999)
Fan, W., Libkin, L.: On xml integrity constraints in the presence of dtds. J. ACM 49(3), 368–406 (2002)
Fielding, R.T.: Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California, Irvine (2000), chair-Taylor, Richard N
Giannakaras, G., Kramis, M.: Temporal REST—How to really exploit XML. In: IADIS International Conference WWW/Internet (2008)
Graf, S.: Treetank, a native xml storage. Tech. rep., Bibliothek der Universität Konstanz, Universitätsstr. 10, 78457 Konstanz (2009), http://kops.ub.uni-konstanz.de/volltexte/2010/10066
Graf, S., Lewandowski, L., Gruen, C.: Jax-rx, unified rest access to xml resources. Tech. rep., Bibliothek der Universität Konstanz, Universitätsstr. 10, 78457 Konstanz (2010), http://kops.ub.uni-konstanz.de/volltexte/2010/12051
Holupirek, A., Grün, C., Scholl, M.H.: Basex and deepfs joint storage for filesystem and database. In: Proceedings of the 12th International Conference on Extending Database Technology, EDBT 2009, pp. 1108–1111. ACM, New York (2009)
Merkle, R.C.: A digital signature based on a conventional encryption function. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 369–378. Springer, Heidelberg (1988)
Olteanu, D., Meuss, H., Furche, T., Bry, F.: Symmetry in xpath. In: Proc. EDBT Workshop on XML Data Management (2002)
O’Neil, P., O’Neil, E., Pal, S., Cseri, I., Schaller, G., Westbury, N.: Ordpaths: insert-friendly xml node labels. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD 2004, pp. 903–908. ACM, New York (2004)
Pautasso, C.: Bpel for rest. In: Dumas, M., Reichert, M., Shan, M.-C. (eds.) BPM 2008. LNCS, vol. 5240, pp. 278–293. Springer, Heidelberg (2008)
da Silva Maciel, L.A.H., Hirata, C.M.: An optimistic technique for transactions control using rest architectural style. In: Proceedings of the 2009 ACM Symposium on Applied Computing, SAC 2009, pp. 664–669. ACM, New York (2009)
Wilde, E.: Putting things to REST. School of Information, UC Berkeley, Tech. Rep. UCB iSchool Report 15 (2007)
Yao, D., Koglin, Y., Bertino, E., Tamassia, R.: Decentralized authorization and data security in web content delivery. In: Proceedings of the 2007 ACM Symposium on Applied Computing, SAC 2007, pp. 1654–1661. ACM, New York (2007)
Ziegeler, C.: Cocoon: Building XML Applications. Pearson Education, London (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Graf, S., Lewandowski, L., Waldvogel, M. (2010). Integrity Assurance for RESTful XML. In: Trujillo, J., et al. Advances in Conceptual Modeling – Applications and Challenges. ER 2010. Lecture Notes in Computer Science, vol 6413. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16385-2_23
Download citation
DOI: https://doi.org/10.1007/978-3-642-16385-2_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16384-5
Online ISBN: 978-3-642-16385-2
eBook Packages: Computer ScienceComputer Science (R0)