skip to main content
article

A fine-grained access control system for XML documents

Published:01 May 2002Publication History
Skip Abstract Section

Abstract

Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing of information via the Web that must be accessed in a selective way, such as electronic commerce transactions, require the definition and enforcement of security controls, ensuring that information will be accessible only to authorized entities. Different approaches have been proposed that address the problem of protecting information in a Web system. However, these approaches typically operate at the file-system level, independently of the data that have to be protected from unauthorized accesses. Part of this problem is due to the limitations of HTML, historically used to design Web documents. The extensible markup language (XML), a markup language promoted by the World Wide Web Consortium (W3C), is de facto the standard language for the exchange of information on the Internet and represents an important opportunity to provide fine-grained access control. We present an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents. We present a language for the specification of access restrictions, which uses standard notations and concepts, together with a description of a system architecture for access control enforcement based on existing technology. The result is a flexible and powerful security system offering a simple integration with current solutions.

References

  1. Abiteboul, S., Amann, B., Cluet, S., Eyal, A., Mignet, L., and Milo, T. 1999. Active views for electronic commerce. In Proceedings of the 25th International Conference on Very Large Data Bases (Edinburgh, Scotland, Sept.), 138--149.]] Google ScholarGoogle Scholar
  2. Adler, S., Berglund, A., Caruso, J., Deach, S., Graham, T., Grosso, P., Gutentag, E., Milowski, A., Parnell, S., Richman, J., and Zilles, S. 2001. Extensible stylesheet language (XSL) version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xsl.]]Google ScholarGoogle Scholar
  3. Agrawal, R., Borgida, A., and Jagadish, H. V. 1989. Efficient management of transitive relationships in large data and knowledge bases. In Proceedings of the ACM SIGMOD'89 Conference (Portland, Or., May--June), ACM, New York, 253--262.]] Google ScholarGoogle Scholar
  4. AlphaWorks. 2001. XML security suite. Available at http://www.alphaWorks.ibm.com/tech/xmlsecuritysuite.]]Google ScholarGoogle Scholar
  5. Apache Software Foundation. 2000. Cocoon, a Java publishing framework. Available at http://xml.apache.org/cocoon.]]Google ScholarGoogle Scholar
  6. Apache Software Foundation. 2001. Xalan-J version 2.2.d14. Available at http://xml.apache.org/xalan-j/.]]Google ScholarGoogle Scholar
  7. Atzeni, P., Ceri, S., Paraboschi, S., and Torlone, R. 1999. Database Systems---Concepts, Languages and Architectures. McGraw-Hill, New York.]] Google ScholarGoogle Scholar
  8. Berners-Lee, T., Fielding, R., Irvine, U., and Masinter, L. 1998. Uniform resource identifiers (URI): Generic syntax. Available at http://www.isi.edu/in-notes/rfc2396.txt.]] Google ScholarGoogle Scholar
  9. Bertino, E., Castano, S., and Ferrari, E. 2001. Securing XML documents with author-x. IEEE Internet Comput. 5, 3 (May/June), 21--31.]] Google ScholarGoogle Scholar
  10. Bertino, E., Castano, S., Ferrari, E., and Mesiti, M. 2000. Specifying and enforcing access control policies for XML document sources. World Wide Web J. 3, 3.]] Google ScholarGoogle Scholar
  11. Biron, P. and Malhotra, A. 2001. XML schema part 2: Datatypes. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xmlschema-2.]]Google ScholarGoogle Scholar
  12. Bray, T., Hollander, D., and Layman, A. 1999. Namespaces in XML. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-xml-names.]]Google ScholarGoogle Scholar
  13. Bray, T., Paoli, J., Sperberg-McQueen, C., and Maler, E. 2000. Extensible markup language (XML) 1.0 (second edition). World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-xml.]]Google ScholarGoogle Scholar
  14. Brickley, D. and Guha, R. 2000. Resource description framework (RDF) schema specification 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/rdf-schema.]]Google ScholarGoogle Scholar
  15. Buneman, P., Fan, W., and Weinstein, S. 2000. Path constraints in semistructured databases. JCSS 61, 2, 146--193.]] Google ScholarGoogle Scholar
  16. Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P., and Stal, M. 1996. Pattern-Oriented Software Architecture---A System of Patterns. Wiley, New York.]] Google ScholarGoogle Scholar
  17. CheckFree Corp. 2001. Open financial exchange specification 2.0.1. CheckFree Corp. Available at http://www.ofx.net/.]]Google ScholarGoogle Scholar
  18. Content Guard. 2001. eXtensible rights markup language (XrML) 2.0. ContentGuard. Available at http://www.xrml.org/.]]Google ScholarGoogle Scholar
  19. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2000a. Design and implementation of an access control processor for XML documents. Comput. Netw. 33, 1--6 (June), 59--75.]] Google ScholarGoogle Scholar
  20. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., and Samarati, P. 2000b. Securing XML documents. In Proceedings of EDBT 2000 (Konstanz, Germany, March), Lecture Notes in Computer Science, vol. 1777, Springer, New York, 121--135.]] Google ScholarGoogle Scholar
  21. DeRose, S., Maler, E., and Orchard, D. 2001. XML linking language (XLink) version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xlink.]]Google ScholarGoogle Scholar
  22. Deutsch, A. and Tannen, V. 2001. Containment and integrity constraints for xpath. In Proceedings of the Eighth International Workshop on Knowledge Representation Meets Databases (Rome, Sept.).]]Google ScholarGoogle Scholar
  23. Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., and Stubblebine, S. 2001. Flexible authentication of XML documents. In Proceedings of the Eighth ACM Conference on Computer and Communications Security (Philadelphia, Nov.).]] Google ScholarGoogle Scholar
  24. Eastlake, D., Reagle, J., and Solo, D. 2001. XML-signature syntax and processing. Available at ftp://ftp.rfc-editor.org/in-notes/rfc3075.txt.]] Google ScholarGoogle Scholar
  25. Ellerman, C. 1997. Channel definition format (CDF). Available at http://www.w3.org/TR/NOTE-CDFsubmit.html.]]Google ScholarGoogle Scholar
  26. Fernandez, E., Gudes, E., and Song, H. 1994. A model of evaluation and administration of security in object-oriented databases. IEEE Trans. Knowl. Data Eng. 6, 2 (April), 275--292.]] Google ScholarGoogle Scholar
  27. Gabillon, A. and Bruno, E. 2001. Regulating access to XML documents. In Proceedings of the Fifteenth Annual IFIP WG 11.3 Conference on Database Security (Niagara on the Lake, Ontario, July).]] Google ScholarGoogle Scholar
  28. Goldman, R., McHugh, J., and Widom, J. 1999. From semistructured data to XML: Migrating the lore data model and query language. In Proceedings of the Second International Workshop on the Web and Databases (WebDB '99) (Philadelphia, June).]]Google ScholarGoogle Scholar
  29. Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. Flexible support for multiple access control policies. ACM Trans. on Database Syst. 26, 2 (June), 214--260.]] Google ScholarGoogle Scholar
  30. Jonscher, D., Moffett, J., and Dittrich, K. 1994. Complex objects or: The striving for complexity is ruling our world. In Database Security, VII: Status and Prospects, T. Keefe and C. Landwehr, Eds., Elsevier Science, Amsterdam, 19--37.]] Google ScholarGoogle Scholar
  31. Kudoh, M., Hirayama, Y., Hada, S., and Vollschwitz, A. 2000. Access control specification based on policy evaluation and enforcement model and specification language. In Symposium on Cryptograpy and Information Security, SCIS'2000.]]Google ScholarGoogle Scholar
  32. Lavender, R. G. and Schmidt, D. 1995. Reactor: An object behavioral pattern for concurrent programming. In Pattern Languages of Program Design 2. J. Vlissides, D. Coplien, and M. Kerth, Eds., Addison-Wesley, Reading, Mass.]] Google ScholarGoogle Scholar
  33. Lea, D. 1996. Concurrent Programming in Java. Addison-Wesley, Reading, Mass.]] Google ScholarGoogle Scholar
  34. Liefke, H. and Davidson, S. 2000. View maintenance for hierarchical semistructured data. In Proceedings of Data Warehousing and Knowledge Discovery (DaWaK 2000) (London Greenwich, UK, Sept.).]] Google ScholarGoogle Scholar
  35. Lunt, T. 1989. Access control policies for database systems. In Database Security, II: Status and Prospects, C. Landwehr, Ed., North-Holland, Amsterdam, 41--52.]]Google ScholarGoogle Scholar
  36. Mendelzon, A. and Wood, P. 1995. Finding regular simple paths in graph databases. SIAM J. Comput. 24, 6, 1235--1258.]] Google ScholarGoogle Scholar
  37. Mowbray, T. and Malveau, R. 1997. CORBA Design Patterns. Wiley, New York.]] Google ScholarGoogle Scholar
  38. Oracle Corp. 2000. Oracle and XML. Available at http://www.oracle.com/xml.]]Google ScholarGoogle Scholar
  39. Park, J., Sandhu, R., and Ahn, G. 2001. Role-based access control on the web. ACM Trans. Inf. Syst. Sec. 4, 1 (Feb.), 37--71.]] Google ScholarGoogle Scholar
  40. Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1 (March), 89--131.]] Google ScholarGoogle Scholar
  41. Raynaud, O. and Thierry, E. 2001. A quasi optimal bit-vector encoding of tree hierarchies. Application to efficient type inclusion tests. In Proceedings of the Fifteenth European Conference on Object-Oriented Programming (ECOOP) (Budapest, June).]] Google ScholarGoogle Scholar
  42. Reagle, J. and Cranor, L. 1999. The platform for privacy preferences. Commun. ACM 42, 2 (Feb.), 48--55.]] Google ScholarGoogle Scholar
  43. Rescher, N. 1969. Many Valued Logics. Mc Graw-Hill, New York.]]Google ScholarGoogle Scholar
  44. Rescorla, E. and Schiffman, A. 1999. The secure hypertext transfer protocol. Available at http://www.ietf.org/rfc/rfc2660.txt.]] Google ScholarGoogle Scholar
  45. Samarati, P. and De Capitani di Vimercati, S. 2001. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Eds., Lecture Notes in Computer Science, vol. 2171. Springer-Verlag, New York.]] Google ScholarGoogle Scholar
  46. Samarati, P., Bertino, E., and Jajodia, S. 1996. An authorization model for a distributed hypertext system. IEEE Trans. Knowl. Data Eng. 8, 4 (August), 555--562.]] Google ScholarGoogle Scholar
  47. Sandhu, R. and Samarati, P. 1997. Authentication, access control and intrusion detection. In CRC Handbook of Computer Science and Engineering, A. Tucker, Ed., CRC Press, Boca Raton, Fla., 1929--1948.]]Google ScholarGoogle Scholar
  48. Sun Microsystems. 1999a. Java server pages (JSP) specification, release 1.1. Available at http:// www.javasoft.com/.]]Google ScholarGoogle Scholar
  49. Sun Microsystems. 1999b. Java servlet API specification, release 2.2. Available at http://www.java soft.com/.]]Google ScholarGoogle Scholar
  50. Thompson, H., Beech, D., Maloney, M., and Mendelsohn, N. 2001. XML schema part 1: Structures. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xmlschema-1.]]Google ScholarGoogle Scholar
  51. van Hoff, A., Partovi, H., and Thai, T. 1997. The open software description format (OSD). Available at http://www.w3.org/TR/NOTE-OSD.html.]]Google ScholarGoogle Scholar
  52. Woo, T. and Lam, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2,3 (Feb.), 107--136.]]Google ScholarGoogle Scholar
  53. World Wide Web Consortium (W3C). 1998. Document object model (DOM) level 1 specification version 1.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/REC-DOM-Level-1.]]Google ScholarGoogle Scholar
  54. World Wide Web Consortium (W3C). 2001. XML path language (XPath) 2.0. World Wide Web Consortium (W3C). Available at http://www.w3.org/TR/xpath20.]]Google ScholarGoogle Scholar

Index Terms

  1. A fine-grained access control system for XML documents

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader