Abstract
We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is integrated using a semantic-based approach that maps each XML schema into an RDF schema and subsequently integrates those schemas into a global RDF schema using a global as view (GAV) approach. We transform the security levels defined on the XML schema elements of each local source into security levels on the triples of the local RDF schemas, which form a lattice. We show how the merged data in the global schema can be classified in different security classes belonging to the global partially ordered security graph.
Work partially supported by NSF Awards ITR IIS-0326284 and IIS-0513553.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beneventano, D., Bergamaschi, S., Vincini, M., Orsini, M., Mbinkeu, R.C.N.: Getting through the THALIA benchmark with MOMIS. In: International Workshop on Database Interoperability (InterDB) co-located with VLDB (2007)
Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Protection and administration of XML data sources. Data and Knowledge Engineering 43(3), 237–260 (2002)
Bonatti, P.A., Sapino, M.L., Subrahmanian, V.S.: Merging heterogeneous security orderings. Journal of Computer Security 5(1), 3–29 (1997)
Brickley, D., Guha, R.: RDF Vocabulary Description Language 1.0: RDF Schema. W3C Working Draft (February 2004), http://www.w3.org/TR/rdf-schema
Candan, K.S., Jajodia, S., Subrahmanian, V.S.: Secure mediated databases. In: IEEE International Conference on Data Engineering (ICDE), pp. 28–37 (1996)
Cruz, I.F., Xiao, H.: Using a Layered Approach for Interoperability on the Semantic Web. In: Int. Conf. Web Information Systems Engineering (WISE), pp. 221–232 (2003)
Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: A fine-grained access control system for XML documents. ACM Trans. on Information and System Security 5(2), 169–202 (2002)
Damiani, E., Samarati, P., De Capitani di Vimercati, S., Paraboschi, S.: Controlling access to XML documents. IEEE Internet Computing 5(6), 18–28 (2001)
Dawson, S., Qian, S., Samarati, P.: Providing security and interoperation of heterogeneous systems. Distributed and Parallel Databases 8(1), 119–145 (2000)
Farkas, C., Jain, A., Wijesekera, D., Singhal, A., Thuraisingham, B.: Semantic-aware data protection in web services. In: IEEE Workshop on Web Service Security (2006)
Jain, A., Farkas, C.: Secure resource description framework: an access control model. In: ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 121–129 (2006)
Kaushik, S., Wijesekera, D., Ammann, P.: Policy-based dissemination of partial web-ontologies. In: Workshop on Secure Web Services (SWS), pp. 43–52 (2005)
Lenzerini, M.: Data integration: a theoretical perspective. In: ACM Sigact-Sigmod-Sigart Symp. on Principles of Database Systems (PODS), pp. 233–246 (2002)
Oliva, M., Saltor, F.: Integrating security policies in federated database systems. In: Annual Working Conf. on Database Security (DBSec), pp. 135–148 (2000)
Pan, C.-C., Mitra, P., Liu, P.: Semantic access control for information interoperation. In: ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 237–246 (2006)
Smith, M.K., Welty, C., McGuinness, D.L.: OWL web ontology language guide (February 2004), http://www.w3.org/TR/owl-guide/
Xiao, H., Cruz, I.F.: Integrating and exchanging XML data using ontologies. In: Spaccapietra, S., Aberer, K., Cudré-Mauroux, P. (eds.) Journal on Data Semantics VI. LNCS, vol. 4090, pp. 67–89. Springer, Heidelberg (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cruz, I.F., Gjomemo, R., Orsini, M. (2008). A Secure Mediator for Integrating Multiple Level Access Control Policies. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2008. Lecture Notes in Computer Science(), vol 5178. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85565-1_45
Download citation
DOI: https://doi.org/10.1007/978-3-540-85565-1_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85564-4
Online ISBN: 978-3-540-85565-1
eBook Packages: Computer ScienceComputer Science (R0)