Advertisement

An Approach for XML Inference Control Based on RDF

  • Li Zhuan
  • Wang Yuanzhen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4080)

Abstract

In this paper, we present a new approach for XML inference control, which is on the foundation of some improvements of an access control model that based on RDF. By using some concepts that derived from XML, such as XML type, XML object etc, we encapsulate the nodes of an XML document to represent the semantic relations among them. We also represent a method about document combination based on XML keys, which can maintain the structural consistency and content consistency between history files and original documents. Since the range of inference control is enlarged and the granularity of authorized objects is expanded, our approach can provide higher security and flexibility for XML documents.

Keywords

Resource Description Framework Semantic Relation Security Policy Access Control Model Inference Control 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Kwong, A., Gertz, M.: Authentic Publication of XML Document Data. In: Proceedings of the 2nd International Conference on Web Information Systems Engineering, pp. 331–340 (2001)Google Scholar
  2. 2.
    Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic Third-Party Data Publication. DBSec 18, 101–112 (2000)Google Scholar
  3. 3.
    Bertino, E., Carminati, B., Ferrari, E., Thuraisingham, B., Gupta, A.: Selective and Authentic Third-Party Distribution of XML Documents. IEEE Transaction on Knowledge and Data Engineering 16(10), 1263–1278 (2004)CrossRefGoogle Scholar
  4. 4.
    Yang, X.C., Li, C.: Secure XML Publishing without Information Leakage in the Presence of Data Inference. In: Proceedings of the 30th VLDB Conference, pp. 96–107 (2004)Google Scholar
  5. 5.
    Gowadia, V., Farkas, C.: RDF metadata for XML access control. In: Proceedings of the 2003 ACM workshop on XML security, pp. 39–48 (2003)Google Scholar
  6. 6.
    Damiani, E., Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM TISSEC 5(2), 169–202 (2002)CrossRefGoogle Scholar
  7. 7.
    Bouganim, L., Dang Ngoc, F., Pucheral, P.: Client-Based Access Control Management for XML documents. In: Proceeding of the 30th VLDB Conference, pp. 84–95 (2004)Google Scholar
  8. 8.
    Fan, W., Chan, C.-Y., Garofalakis, M.: Secure XML Querying with Security Views. In: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 587–598 (2004)Google Scholar
  9. 9.
    Farkas, C., Stoica, A.: Correlated data inference in ontology guided XML security engine. In: Proceedings of 17th WG 11.3 working conference on Data and Application Security (2003)Google Scholar
  10. 10.
    W.W.W.Consortium. Extensible Markup Language 1.0 specification. W3C Recommendation (2000), retrieved from: http://www.w3.org/TR/2000/REC-xml-20001006
  11. 11.
    W.W.W.Consortium. RDF Primer. W3C Recommendation (2004), retrieved from: http://www.w3.org/TR/2004/REC-rdf-primer-20040210
  12. 12.
    Denning, D.E.: A Preliminary Note on the Inference Problem in Multilevel Database Management Systems. In: Proceedings of the National Computer Security Center Invitational Workshop on Database Security (1986)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Li Zhuan
    • 1
  • Wang Yuanzhen
    • 1
  1. 1.School of computer science and technologyHuazhong University of science and technologyWuhanP.R. China

Personalised recommendations