Abstract
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing of information via the Web that must be accessed in a selective way, such as electronic commerce transactions, require the definition and enforcement of security controls, ensuring that information will be accessible only to authorized entities. Different approaches have been proposed that address the problem of protecting information in a Web system. However, these approaches typically operate at the file-system level, independently of the data that have to be protected from unauthorized accesses. Part of this problem is due to the limitations of HTML, historically used to design Web documents. The extensible markup language (XML), a markup language promoted by the World Wide Web Consortium (W3C), is de facto the standard language for the exchange of information on the Internet and represents an important opportunity to provide fine-grained access control. We present an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents. We present a language for the specification of access restrictions, which uses standard notations and concepts, together with a description of a system architecture for access control enforcement based on existing technology. The result is a flexible and powerful security system offering a simple integration with current solutions.
- Abiteboul, S., Amann, B., Cluet, S., Eyal, A., Mignet, L., and Milo, T. 1999. Active views for electronic commerce. In Proceedings of the 25th International Conference on Very Large Data Bases (Edinburgh, Scotland, Sept.), 138--149.]] Google Scholar
- Adler, S., Berglund, A., Caruso, J., Deach, S., Graham, T., Grosso, P., Gutentag, E., Milowski, A., Parnell, S., Richman, J., and Zilles, S. 2001. Extensible stylesheet language (XSL) version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xsl.]]Google Scholar
- Agrawal, R., Borgida, A., and Jagadish, H. V. 1989. Efficient management of transitive relationships in large data and knowledge bases. In Proceedings of the ACM SIGMOD'89 Conference (Portland, Or., May--June), ACM, New York, 253--262.]] Google Scholar
- AlphaWorks. 2001. XML security suite. Available at http://www.alphaWorks.ibm.com/tech/xmlsecuritysuite.]]Google Scholar
- Apache Software Foundation. 2000. Cocoon, a Java publishing framework. Available at http://xml.apache.org/cocoon.]]Google Scholar
- Apache Software Foundation. 2001. Xalan-J version 2.2.d14. Available at http://xml.apache.org/xalan-j/.]]Google Scholar
- Atzeni, P., Ceri, S., Paraboschi, S., and Torlone, R. 1999. Database Systems---Concepts, Languages and Architectures. McGraw-Hill, New York.]] Google Scholar
- Berners-Lee, T., Fielding, R., Irvine, U., and Masinter, L. 1998. Uniform resource identifiers (URI): Generic syntax. Available at http://www.isi.edu/in-notes/rfc2396.txt.]] Google Scholar
- Bertino, E., Castano, S., and Ferrari, E. 2001. Securing XML documents with author-x. IEEE Internet Comput. 5, 3 (May/June), 21--31.]] Google Scholar
- Bertino, E., Castano, S., Ferrari, E., and Mesiti, M. 2000. Specifying and enforcing access control policies for XML document sources. World Wide Web J. 3, 3.]] Google Scholar
- Biron, P. and Malhotra, A. 2001. XML schema part 2: Datatypes. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xmlschema-2.]]Google Scholar
- Bray, T., Hollander, D., and Layman, A. 1999. Namespaces in XML. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-xml-names.]]Google Scholar
- Bray, T., Paoli, J., Sperberg-McQueen, C., and Maler, E. 2000. Extensible markup language (XML) 1.0 (second edition). World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-xml.]]Google Scholar
- Brickley, D. and Guha, R. 2000. Resource description framework (RDF) schema specification 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/rdf-schema.]]Google Scholar
- Buneman, P., Fan, W., and Weinstein, S. 2000. Path constraints in semistructured databases. JCSS 61, 2, 146--193.]] Google Scholar
- Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M. 1996. Pattern-Oriented Software Architecture---A System of Patterns. Wiley, New York.]] Google Scholar
- CheckFree Corp. 2001. Open financial exchange specification 2.0.1. CheckFree Corp. Available at http://www.ofx.net/.]]Google Scholar
- Content Guard. 2001. eXtensible rights markup language (XrML) 2.0. ContentGuard. Available at http://www.xrml.org/.]]Google Scholar
- Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2000a. Design and implementation of an access control processor for XML documents. Comput. Netw. 33, 1--6 (June), 59--75.]] Google Scholar
- Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2000b. Securing XML documents. In Proceedings of EDBT 2000 (Konstanz, Germany, March), Lecture Notes in Computer Science, vol. 1777, Springer, New York, 121--135.]] Google Scholar
- DeRose, S., Maler, E., and Orchard, D. 2001. XML linking language (XLink) version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xlink.]]Google Scholar
- Deutsch, A. and Tannen, V. 2001. Containment and integrity constraints for xpath. In Proceedings of the Eighth International Workshop on Knowledge Representation Meets Databases (Rome, Sept.).]]Google Scholar
- Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., and Stubblebine, S. 2001. Flexible authentication of XML documents. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (Philadelphia, Nov.).]] Google Scholar
- Eastlake, D., Reagle, J., and Solo, D. 2001. XML-signature syntax and processing. Available at ftp://ftp.rfc-editor.org/in-notes/rfc3075.txt.]] Google Scholar
- Ellerman, C. 1997. Channel definition format (CDF). Available at http://www.w3.org/TR/NOTE-CDFsubmit.html.]]Google Scholar
- Fernandez, E., Gudes, E., and Song, H. 1994. A model of evaluation and administration of security in object-oriented databases. IEEE Trans. Knowl. Data Eng. 6, 2 (April), 275--292.]] Google Scholar
- Gabillon, A. and Bruno, E. 2001. Regulating access to XML documents. In Proceedings of the Fifteenth Annual IFIP WG 11.3 Conference on Database Security (Niagara on the Lake, Ontario, July).]] Google Scholar
- Goldman, R., McHugh, J., and Widom, J. 1999. From semistructured data to XML: Migrating the lore data model and query language. In Proceedings of the Second International Workshop on the Web and Databases (WebDB '99) (Philadelphia, June).]]Google Scholar
- Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. Flexible support for multiple access control policies. ACM Trans. on Database Syst. 26, 2 (June), 214--260.]] Google Scholar
- Jonscher, D., Moffett, J., and Dittrich, K. 1994. Complex objects or: The striving for complexity is ruling our world. In Database Security, VII: Status and Prospects, T. Keefe and C. Landwehr, Eds., Elsevier Science, Amsterdam, 19--37.]] Google Scholar
- Kudoh, M., Hirayama, Y., Hada, S., and Vollschwitz, A. 2000. Access control specification based on policy evaluation and enforcement model and specification language. In Symposium on Cryptograpy and Information Security, SCIS'2000.]]Google Scholar
- Lavender, R. G. and Schmidt, D. 1995. Reactor: An object behavioral pattern for concurrent programming. In Pattern Languages of Program Design 2. J. Vlissides, D. Coplien, and M. Kerth, Eds., Addison-Wesley, Reading, Mass.]] Google Scholar
- Lea, D. 1996. Concurrent Programming in Java. Addison-Wesley, Reading, Mass.]] Google Scholar
- Liefke, H. and Davidson, S. 2000. View maintenance for hierarchical semistructured data. In Proceedings of Data Warehousing and Knowledge Discovery (DaWaK 2000) (London Greenwich, UK, Sept.).]] Google Scholar
- Lunt, T. 1989. Access control policies for database systems. In Database Security, II: Status and Prospects, C. Landwehr, Ed., North-Holland, Amsterdam, 41--52.]]Google Scholar
- Mendelzon, A. and Wood, P. 1995. Finding regular simple paths in graph databases. SIAM J. Comput. 24, 6, 1235--1258.]] Google Scholar
- Mowbray, T. and Malveau, R. 1997. CORBA Design Patterns. Wiley, New York.]] Google Scholar
- Oracle Corp. 2000. Oracle and XML. Available at http://www.oracle.com/xml.]]Google Scholar
- Park, J., Sandhu, R., and Ahn, G. 2001. Role-based access control on the web. ACM Trans. Inf. Syst. Sec. 4, 1 (Feb.), 37--71.]] Google Scholar
- Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1 (March), 89--131.]] Google Scholar
- Raynaud, O. and Thierry, E. 2001. A quasi optimal bit-vector encoding of tree hierarchies. Application to efficient type inclusion tests. In Proceedings of the Fifteenth European Conference on Object-Oriented Programming (ECOOP) (Budapest, June).]] Google Scholar
- Reagle, J. and Cranor, L. 1999. The platform for privacy preferences. Commun. ACM 42, 2 (Feb.), 48--55.]] Google Scholar
- Rescher, N. 1969. Many Valued Logics. Mc Graw-Hill, New York.]]Google Scholar
- Rescorla, E. and Schiffman, A. 1999. The secure hypertext transfer protocol. Available at http://www.ietf.org/rfc/rfc2660.txt.]] Google Scholar
- Samarati, P. and De Capitani di Vimercati, S. 2001. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Eds., Lecture Notes in Computer Science, vol. 2171. Springer-Verlag, New York.]] Google Scholar
- Samarati, P., Bertino, E., and Jajodia, S. 1996. An authorization model for a distributed hypertext system. IEEE Trans. Knowl. Data Eng. 8, 4 (August), 555--562.]] Google Scholar
- Sandhu, R. and Samarati, P. 1997. Authentication, access control and intrusion detection. In CRC Handbook of Computer Science and Engineering, A. Tucker, Ed., CRC Press, Boca Raton, Fla., 1929--1948.]]Google Scholar
- Sun Microsystems. 1999a. Java server pages (JSP) specification, release 1.1. Available at http:// www.javasoft.com/.]]Google Scholar
- Sun Microsystems. 1999b. Java servlet API specification, release 2.2. Available at http://www.java soft.com/.]]Google Scholar
- Thompson, H., Beech, D., Maloney, M., and Mendelsohn, N. 2001. XML schema part 1: Structures. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xmlschema-1.]]Google Scholar
- van Hoff, A., Partovi, H., and Thai, T. 1997. The open software description format (OSD). Available at http://www.w3.org/TR/NOTE-OSD.html.]]Google Scholar
- Woo, T. and Lam, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2,3 (Feb.), 107--136.]]Google Scholar
- World Wide Web Consortium (W3C). 1998. Document object model (DOM) level 1 specification version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-DOM-Level-1.]]Google Scholar
- World Wide Web Consortium (W3C). 2001. XML path language (XPath) 2.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xpath20.]]Google Scholar
Index Terms
- A fine-grained access control system for XML documents
Recommendations
Design of access control system for telemedicine secure XML documents
XML can supply the standard data type in information exchange format on a lot of data generated in running database or applied programs for a company by using the advantage that it can describe meaningful information directly. Accordingly since there ...
XML repository searcher-browser supporting fine-grained access control
The widespread use of eXtensible Markup Language (XML) for data representation and exchange has led to increasing research interest in methods for XML content searching, presentation, and access control. This paper presents an XML repository searcher-...
A Fine-Grained Access Control System Combining MAC and RBACK Models for XML
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there are a huge number of users who access different portions of an XML ...
Comments