Academic
Publications
Access-Condition-Table-Driven Access Control for XML Databases

Access-Condition-Table-Driven Access Control for XML Databases,10.1007/978-3-540-30108-0_2,Naizhen Qi,Michiharu Kudo

Access-Condition-Table-Driven Access Control for XML Databases   (Citations: 10)
BibTex | RIS | RefWorks Download
Access control represented by XPath expressions allows for access restrictions on elements, attributes, and text nodes according to their locations and values in an XML document. Many XML database applications call for such node-level access control on concerned nodes at any depth. To perform such node-level access control, current approaches create heavy loads on XML database applications since these approaches incur massive costs either at runtime or for data optimization. In order to solve these problems, we introduce an access condition table (ACT), a table equivalent to an access control policy, where Boolean access conditions for accessibility checks are stored. The ACT is generated as a means of shifting the extra runtime computations to a pre-processing step. Experimental results show that the proposed ACT can handle accesses to arbitrary paths at a nearly constant speed.
Cumulative Annual
View Publication
The following links allow you to view full publications. These links are maintained by other sources not affiliated with Microsoft Academic Search.
    • ...access control before query evaluation, e.g., static analysis approach [41,42],function-based approach [45],access condition table approach [43] policy matching tree [44], secure queryrewrite(SQR)approach[40].Meanwhile,client-based access control [6] resembles post-processing approach...

    Bo Luoet al. QFilter: rewriting insecure XML queries to secure ones using non-deter...

    • ...Qi et al. [8], In their research paper, they presented a method that performs in near-constant time regardless of the number of access control rules...

    Aye Sandar Myint. High performance and scalable client-based access control model for XM...

    • ...1(3) pre-processing approaches check user queries and enforce access control rules before queries are evaluated, such as the static analysis approach [40, 41], QFilter approach [35], function-based approach [46], access condition table approach [44] policy matching tree[45], secure query rewrite (SQR) approach [38], etc...

    Bo Luoet al. Pragmatic XML Access Control Using Off-the-Shelf RDBMS

    • ...To overcome this problem, several efficient access control models have been proposed [22, 25]...
    • ...Qi et al. [25], our previous research, presents a method performing in near-constant time regardless of the number of rules...
    • ...Easy updating is also a significant improvement from our previous approaches [25, 26] in which policy update leads to a re-computation of the entire access control table or the entire policy matching tree...
    • ...In our previous work [25], the access condition table driven access control model performs a little faster in that it takes approximately 2.0 microseconds per path...
    • ...Moreover, in [25], the access control enforcement on predicates and // are not provided by the system that the user has to implement the enforcement by themselves...

    Naizhen Qiet al. A Scalable Access Control Model for XML Databases

    • ...In our previous research [28], we proposed an efficient table-driven access control model that takes into account XML document updates...
    • ...To overcome this problem, several efficient access control models have been proposed [25, 28]...
    • ...Qi et al. [28], our previous research, presented a method that performs in near-constant time regardless of the number of access control rules...

    Naizhen Qiet al. A function-based access control model for XML databases

Sort by: