Specifying and enforcing access control policies for XML document sources

  • Authors:
  • Elisa Bertino;Silvana Castano;Elena Ferrari;Marco Mesiti

  • Affiliations:
  • Dipartimento di Scienze dell'Informazione, Università degli Studi di Milano, Via Comelico, 39/41 20135 Milano, Italy E-mail: {bertino,castano,ferrarie}@dsi.unimi.it;Dipartimento di Scienze dell'Informazione, Università degli Studi di Milano, Via Comelico, 39/41 20135 Milano, Italy E-mail: {bertino,castano,ferrarie}@dsi.unimi.it;Dipartimento di Scienze dell'Informazione, Università degli Studi di Milano, Via Comelico, 39/41 20135 Milano, Italy E-mail: {bertino,castano,ferrarie}@dsi.unimi.it;Dipartimento di Informatica e Scienze dell'Informazione, Università degli Studi di Genova, Via Dodecaneso, 35 16146 Genova, Italy E-mail: mesiti@disi.unige.it

  • Venue:
  • World Wide Web
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Web is becoming the main information dissemination means in private and public organizations. As a consequence, several applications at both internet and intranet level need mechanisms to support a selective access to data available over the Web. In this context, developing an access control model, and related mechanisms, in terms of XML (eXtensible Markup Language) is an important step, because XML is increasingly used as the language for representing information exchanged over the Web. In this paper, we propose access control policies and an associated model for XML documents, addressing peculiar protection requirements posed by XML. A first requirement is that varying protection granularity levels should be supported to guarantee a differentiated protection of document contents. A second requirement arises from the fact that XML documents do not always conform to a predefined document type. To cope with these requirements, the proposed model supports varying protection granularity levels, ranging from a set of documents, to a single document or specific document portion(s). Moreover, it allows the Security Administrator to choose different policies for documents not covered or only partially covered by the existing access control policies for document types. An access control mechanism for the enforcement of the proposed model is finally described.