Two-Stage access control model for XML security

  • Authors:
  • Wei Sun;Da-xin Liu;Tong Wang

  • Affiliations:
  • College of Computer Science and Technology, HARBIN Engineering University, HARBIN, Heilongjiang Province, China;College of Computer Science and Technology, HARBIN Engineering University, HARBIN, Heilongjiang Province, China;College of Computer Science and Technology, HARBIN Engineering University, HARBIN, Heilongjiang Province, China

  • Venue:
  • ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

As large corporations and organizations increasingly exploit the Internet as a means of improving business-transaction efficiency and productivity, it is increasingly common to find operational data and other business information in XML format. Access control for XML database is non-trivial subjects. A number of recent research efforts have considered access control models for XML data[1−5]. Our first contribution is a novel model for specifying XML security access control. Given an XML document accompanied by a document DTD, we allow a two-stage access control policies to pledge to security access XML document at file-level and element-level respectively. On the element-level access control, our approach for these access control policies is based on the novel notion of hide-node views. While the hide-node view DTD is exposed to authorized users, neither the internal XPath annotations nor the full document DTD is visible. Authorized users can only operate data over the hide-node view, making use of the exposed view DTD to access data. Our hide-node view mechanism guarantees that unauthorized user cannot access sensitive data and protects the schema information from access by unauthorized users. We think that the schema information also is sensitive data and should be protected from gain through the data accessing.