Advertisement

Query Translation for XPath-Based Security Views

  • Roel Vercammen
  • Jan Hidders
  • Jan Paredaens
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4254)

Abstract

Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restricting access to data by certain users. This can, for example, be achieved by means of access rules or XML security views, which define projections over XML documents. The usage of security views avoids information leakage that may occur when we use certain access rules. XML views can be implemented by materialized views, but materialization and maintenance of views may cause considerable overhead. Therefore, we study translations from queries on views to equivalent queries on the original XML documents, assuming both the security views and the queries are specified by XPath expressions. Especially, we investigate which XPath fragments are closed under the composition of a view and a query.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Benedikt, M., Fan, W., Kuper, G.M.: Structural properties of xPath fragments. In: Calvanese, D., Lenzerini, M., Motwani, R. (eds.) ICDT 2003. LNCS, vol. 2572, pp. 79–95. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    Benedikt, M., Fundulaki, I.: XML subtree queries: Specification and composition. In: Bierman, G., Koch, C. (eds.) DBPL 2005. LNCS, vol. 3774, pp. 138–153. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Berglund, A., Boag, S., Chamberlin, D., Fernández, M., Kay, M., Robie, J., Siméon, J.: XML path language (XPath) 2.0, W3C working draft (2005), http://www.w3.org/TR/xpath20
  4. 4.
    Bertino, E., Ferrari, E.: Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur. 5(3), 290–331 (2002)CrossRefGoogle Scholar
  5. 5.
    Draper, D., Frankhauser, P., Fernández, M., Malhotra, A., Rose, K., Rys, M., Siméon, J., Wadler, P.: XQuery 1.0 and XPath 2.0 formal semantics. W3C Working Draft (2005)Google Scholar
  6. 6.
    Fan, W., Chan, C.Y., Garofalakis, M.N.: Secure XML querying with security views. In: SIGMOD Conference, pp. 587–598 (2004)Google Scholar
  7. 7.
    Fernández, M., Malhotra, A., Marsh, J., Nagy, M., Walsh, N.: XQuery 1.0 and XPath 2.0 data model (XDM) (2005), http://www.w3.org/TR/xpath-datamodel/
  8. 8.
    Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: SACMAT 2004, pp. 61–69 (2004)Google Scholar
  9. 9.
    Godik, S., Moses, T. (eds.): eXtensible Access Control Markup Language (XACML) Version 1.0. (February 2003)Google Scholar
  10. 10.
    Gottlob, G., Koch, C., Pichler, R.: The complexity of XPath query evaluation. In: PODS 2003, San Diego, California, pp. 179–190 (2003)Google Scholar
  11. 11.
    Kudo, M., Hada, S.: XML access control, http://www.trl.ibm.com/projects/xml/xacl/
  12. 12.
    Kuper, G., Fabio, M., Nataliya, R.: Generalized XML security views. In: SACMAT 2005, pp. 77–84 (2005)Google Scholar
  13. 13.
    Murata, M., Tozawa, A., Kudo, M., Hada, S.: XML access control using static analysis. In: CCS, pp. 73–84 (2003)Google Scholar
  14. 14.
    Stoica, A., Farkas, C.: Secure XML views. In: Gudes, E., Shenoi, S. (eds.) DBSec. IFIP Conference Proceedings, vol. 256, pp. 133–146. Kluwer, Dordrecht (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Roel Vercammen
    • 1
  • Jan Hidders
    • 1
  • Jan Paredaens
    • 1
  1. 1.University of AntwerpBelgium

Personalised recommendations