Skip to main content

A Secure Mediator for Integrating Multiple Level Access Control Policies

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2008)

Abstract

We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is integrated using a semantic-based approach that maps each XML schema into an RDF schema and subsequently integrates those schemas into a global RDF schema using a global as view (GAV) approach. We transform the security levels defined on the XML schema elements of each local source into security levels on the triples of the local RDF schemas, which form a lattice. We show how the merged data in the global schema can be classified in different security classes belonging to the global partially ordered security graph.

Work partially supported by NSF Awards ITR IIS-0326284 and IIS-0513553.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beneventano, D., Bergamaschi, S., Vincini, M., Orsini, M., Mbinkeu, R.C.N.: Getting through the THALIA benchmark with MOMIS. In: International Workshop on Database Interoperability (InterDB) co-located with VLDB (2007)

    Google Scholar 

  2. Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Protection and administration of XML data sources. Data and Knowledge Engineering 43(3), 237–260 (2002)

    Article  MATH  Google Scholar 

  3. Bonatti, P.A., Sapino, M.L., Subrahmanian, V.S.: Merging heterogeneous security orderings. Journal of Computer Security 5(1), 3–29 (1997)

    Google Scholar 

  4. Brickley, D., Guha, R.: RDF Vocabulary Description Language 1.0: RDF Schema. W3C Working Draft (February 2004), http://www.w3.org/TR/rdf-schema

  5. Candan, K.S., Jajodia, S., Subrahmanian, V.S.: Secure mediated databases. In: IEEE International Conference on Data Engineering (ICDE), pp. 28–37 (1996)

    Google Scholar 

  6. Cruz, I.F., Xiao, H.: Using a Layered Approach for Interoperability on the Semantic Web. In: Int. Conf. Web Information Systems Engineering (WISE), pp. 221–232 (2003)

    Google Scholar 

  7. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Trans. on Information and System Security 5(2), 169–202 (2002)

    Article  Google Scholar 

  8. Damiani, E., Samarati, P., De Capitani di Vimercati, S., Paraboschi, S.: Controlling access to XML documents. IEEE Internet Computing 5(6), 18–28 (2001)

    Article  Google Scholar 

  9. Dawson, S., Qian, S., Samarati, P.: Providing security and interoperation of heterogeneous systems. Distributed and Parallel Databases 8(1), 119–145 (2000)

    Article  Google Scholar 

  10. Farkas, C., Jain, A., Wijesekera, D., Singhal, A., Thuraisingham, B.: Semantic-aware data protection in web services. In: IEEE Workshop on Web Service Security (2006)

    Google Scholar 

  11. Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 121–129 (2006)

    Google Scholar 

  12. Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Workshop on Secure Web Services (SWS), pp. 43–52 (2005)

    Google Scholar 

  13. Lenzerini, M.: Data integration: a theoretical perspective. In: ACM Sigact-Sigmod-Sigart Symp. on Principles of Database Systems (PODS), pp. 233–246 (2002)

    Google Scholar 

  14. Oliva, M., Saltor, F.: Integrating security policies in federated database systems. In: Annual Working Conf. on Database Security (DBSec), pp. 135–148 (2000)

    Google Scholar 

  15. Pan, C.-C., Mitra, P., Liu, P.: Semantic access control for information interoperation. In: ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 237–246 (2006)

    Google Scholar 

  16. Smith, M.K., Welty, C., McGuinness, D.L.: OWL web ontology language guide (February 2004), http://www.w3.org/TR/owl-guide/

  17. Xiao, H., Cruz, I.F.: Integrating and exchanging XML data using ontologies. In: Spaccapietra, S., Aberer, K., Cudré-Mauroux, P. (eds.) Journal on Data Semantics VI. LNCS, vol. 4090, pp. 67–89. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ignac Lovrek Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cruz, I.F., Gjomemo, R., Orsini, M. (2008). A Secure Mediator for Integrating Multiple Level Access Control Policies. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85565-1_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85565-1_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85564-4

  • Online ISBN: 978-3-540-85565-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics