Definition
XML access control refers to the practice of limiting access to (parts of) XML data to only authorized users. Similar to access control over other types of data and resources, XML access control is centered around two key problems: (i) the development of formal models for the specification of access control policies over XML data; and (ii) techniques for efficient enforcement of access control policies over XML data.
Historical Background
Access control is one of the fundamental security mechanisms in information systems. It is concerned with who can access which information under what circumstances. The need for access control arises naturally when a multi-user system offers selective access to shared information. As one of the oldest problems in security, access control has been studied extensively in a variety of contexts, including operating systems, databases, and computer networks.
The most influential policy models today are discretional access control (DAC),...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Bertino E, Ferrari E. Secure and selective dissemination of XML documents. ACM Trans Inform Syst Secur. 2002;5(3):290–331.
Bouganim L, Ngoc FD, Pucheral P. Client-based access control management for XML documents. In: Proceedings of the 30th International Conference on Very Large Data Bases; 2004. p. 84–95.
Cho S, Amer-Yahia S, Lakshmanan LVS, Srivastava D. Optimizing the secure evaluation of twig queries. In: Proceedings of the 28th International Conference on Very Large Data Bases; 2002. p. 490–501.
Damiani E, Vimercati S, Paraboschi S, Samarati P. A fine-grained access control system for XML documents. ACM Trans Inform Syst Secur. 2002;5(2):169–202.
Fan W, Chan CY, Garofalakis M. Secure XML querying with security views. In: Proceedings of the ACM SIGMOD International Conference on Management of Data; 2004. p. 587–98.
Koudas N, Rabinovich M, Srivastava D, Yu T. Routing XML queries. In: Proceedings of the 20th International Conference on Data Engineering; 2004. p. 844.
Kudo M, Hada S. XML document security based on provisional authorization. In: Proceedings of the 7th ACM Conference on Computer and Communications Security; 2002. p. 87–96.
Li F, Luo B, Liu P, Lee D, Chu CH. Automaton segmentation: a new approach to preserve privacy in XML information brokering. In: Proceedings of the 14th ACM Conference on Computer and Communications Security; 2007. p. 508–18.
Luo B, Lee D, Lee WC, Liu P. QFilter: fine-grained run-time XML access control via NFA-based query rewriting. In: Proceedings Intrnational Conference on Information and Knowledge Management; 2004. p. 543–52.
Murata M, Tozawa A, Kudo M. XML access control using static analysis. In: Proceedings of the 10th ACM Conference on Computer and Communication Security; 2003. p. 73–84.
Yu T, Srivastava D, Lakshmanan LVS, Jagadish HV. A compressed accessibility map for XML. ACM Trans Database Syst. 2004;29(2):363–402.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer Science+Business Media, LLC, part of Springer Nature
About this entry
Cite this entry
Lee, D., Yu, T. (2018). XML Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_790
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8265-9_790
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8266-6
Online ISBN: 978-1-4614-8265-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering