skip to main content
10.1145/1063979.1063995acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Relevancy based access control of versioned XML documents

Published: 01 June 2005 Publication History

Abstract

Integration of version and access control of XML documents has the benefit of regulating access to rapidly growing archives of XML documents. Versioned XML documents provide us with valuable informations on dependencies between document nodes, but at the same time presenting the risk of undesirable data disclosure. In this paper we introduce the notion of relevancy-based access control, which realizes protection of versioned XML documents by various types of relevancy, such as version dependencies, schema similarities and temporal proximity. We define a new path query language XVerPath over XML document versions, which can be utilized for specifying relevancy-based access control policies. We also introduce the notion of relevancy class, for collectively and compactly specifying relevancy-based policies.

References

[1]
C. Anutariya, S. Chatvichienchai, M. Iwaihara, V. Wuwongse, Y. Kambayashi, "A Rule-Based XML Access Control Model," Proc. of the 2nd Workshop on Rules and Rule Markup Languages for the Semantic Web, pp. 35--48, Oct. 2003.
[2]
E. Bertino, C. Bettini, E. Ferrari, P. Samarat, "A Temporal Access Control Mechanism for Database Systems," IEEE Trans. Knowl. Data Eng. vol. 8, no. 1, pp. 67--80, 1996.
[3]
E. Bertino, S. Castano, E. Ferrari, M. Mesiti, "Specifying and Enforcing Access Control Policies for XML Document Sources," WWW Journal, vol.3, n.3, 2000.
[4]
S. Chatvichienchai, C. Anutariya, M. Iwaihara, V. Wuwongse, Y. Kambayashi, "Towards Integration of XML Document Access and Version Control," Proc. Database and Expert Systems Applications (DEXA2004), pp. 791--800, Sep. 2004.
[5]
S. Y. Chien, V. J. Tsotras, and C. Zaniolo, "Efficient Management of Multiversion Documents by Object Referencing," Proc. 27th VLDB Conf., pp. 291--300, Sep. 2001.
[6]
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, "A Fine-Grained Access Control System for XML Documents," ACM TISSEC, vol. 5, no. 2, 2002.
[7]
L. Bouganim, F. Dang Ngoc, P. Pucheral, "Client-Based Access Control Management for XML Documents," Proc. of the 30th VLDB conference, pp. 84--95, Sep. 2004.
[8]
V. Gowadia, C. Farkas, "RDF Metadata for XML Access Control," Proc. ACM Workshop on XML Security, pp. 39-48, Oct. 2003.
[9]
M. Kudo and S. Hada, "XML Document Security based on Provisional Authorization," Proc. 7th ACM Conf. Computer and Communications Security, pp. 87--96, 2000.
[10]
A. Marian, S. Abiteboul, G. Cobna, and L. Mignet, "Change-centric management of versions in an XML warehouse," Proc. 27th VLDB Conf., pp. 581--590, Sep. 2001.
[11]
OASIS XACML Technical Committee, "eXtensible Access Control Markup Language (XACML) Version 2.0," http://www.oasis-open.org/specs/index.php #xacmlv2.0, Feb. 2005.
[12]
XML Path Language (XPath) Version 1.0, W3C Recommendation 16 November 1999, http://www.w3.org/TR/xpath.
[13]
R.K. Wong, N. Lam, "Managing and Querying Multi-Version XML Data with Update Logging," Proc. 2002 ACM Symposium on Document Engineering, pp. 74-81, Nov. 2002.
[14]
V. Wuwongse, C. Anutariya, K. Akama, and E. Nantajeewarawat, "XML Declarative Description (XDD): A Language for the Semantic Web," IEEE Intelligent Systems, Vol. 16, No. 3, 2001.

Cited By

View all
  • (2007)A system architecture for history-based access control for XML documentsProceedings of the 9th international conference on Information and communications security10.5555/1785001.1785038(362-374)Online publication date: 12-Dec-2007
  • (2007)Fine-grained sticky provenance architecture for office documentsProceedings of the Security 2nd international conference on Advances in information and computer security10.5555/1778902.1778932(336-351)Online publication date: 29-Oct-2007
  • (2007)On flexible modeling of history-based access control policies for XML documentsProceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III10.5555/1771230.1771383(1090-1097)Online publication date: 12-Sep-2007
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
June 2005
186 pages
ISBN:1595930450
DOI:10.1145/1063979
  • General Chair:
  • Elena Ferrari,
  • Program Chair:
  • Gail-Joon Ahn
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. XML
  2. XPath
  3. access control
  4. query language
  5. security
  6. version control

Qualifiers

  • Article

Conference

SACMAT05
Sponsor:

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2007)A system architecture for history-based access control for XML documentsProceedings of the 9th international conference on Information and communications security10.5555/1785001.1785038(362-374)Online publication date: 12-Dec-2007
  • (2007)Fine-grained sticky provenance architecture for office documentsProceedings of the Security 2nd international conference on Advances in information and computer security10.5555/1778902.1778932(336-351)Online publication date: 29-Oct-2007
  • (2007)On flexible modeling of history-based access control policies for XML documentsProceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III10.5555/1771230.1771383(1090-1097)Online publication date: 12-Sep-2007
  • (2007)Relevancy-based access control and its evaluation on versioned XML documentsACM Transactions on Information and System Security10.1145/1210263.121026610:1(3-es)Online publication date: 1-Feb-2007
  • (2007)Access Control of XML Documents and Business Rule Processing for Advanced Information ExchangeProceedings of the Second International Conference on Informatics Research for Development of Knowledge Society Infrastructure10.1109/ICKS.2007.2(177-184)Online publication date: 29-Jan-2007
  • (2007)Fine-Grained Sticky Provenance Architecture for Office DocumentsAdvances in Information and Computer Security10.1007/978-3-540-75651-4_23(336-351)Online publication date: 2007
  • (2007)On Flexible Modeling of History-Based Access Control Policies for XML DocumentsKnowledge-Based Intelligent Information and Engineering Systems10.1007/978-3-540-74829-8_133(1090-1097)Online publication date: 2007

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media