Authorization translation for XML document transformation

被引:4
|
作者
Chatvichienchai, S [1 ]
Iwaihara, M [1 ]
Kambayashi, Y [1 ]
机构
[1] Kyoto Univ, Dept Social Informat, Kyoto 6068501, Japan
关键词
XML documents; authorizations; database security; XML access control models; document transformation;
D O I
10.1023/B:WWWJ.0000015867.80713.fc
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XML access control models proposed in the literature enforce access restrictions directly on the structure and content of an XML document. Therefore access authorization rules (authorizations, for short), which specify access rights of users on information within an XML document, must be revised if they do not match with changed structure of the XML document. In this paper, we present two authorization translation problems. The first is a problem of translating instance-level authorizations for an XML document. The second is a problem of translating schema-level authorizations for a collection of XML documents conforming to a DTD. For the first problem, we propose an algorithm that translates instance-level authorizations of a source XML document into those for a transformed XML document by using instance-tree mapping from the transformed document instance to the source document instance. For the second problem, we propose an algorithm that translates value-independent schema-level authorizations of non-recursive source DTD into those for a non-recursive target DTD by using schema-tree mapping from the target DTD to the source DTD. The goal of authorization translation is to preserve authorization equivalence at instance node level of the source document. The XML access control models use path expressions of XPath to locate data in XML documents. We define property of the path expressions (called node-reducible path expressions) that we can transform schema-level authorizations of value-independent type by schema-tree mapping. To compute authorizations on instances of schema elements of the target DTD, we need to identify the schema elements whose instances are located by a node-reducible path expression of a value-independent schema-level authorization. We give an algorithm that carries out path fragment containment test to identify the schema elements whose instances are located by a node-reducible path expression.
引用
收藏
页码:111 / 138
页数:28
相关论文
共 50 条
  • [1] Authorization Translation for XML Document Transformation
    Somchai Chatvichienchai
    Mizuho Iwaihara
    Yahiko Kambayashi
    [J]. World Wide Web, 2004, 7 : 111 - 138
  • [2] Access authorization policy for XML document security
    Jo, SM
    Kim, KT
    Kouh, HJ
    Yoo, WH
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 589 - 598
  • [3] Access control to XML document including administrative authorization
    Islam, Khandoker Asadul
    Watanabe, Yoshimichi
    [J]. PROCEEDINGS OF THE FIFTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2006, : 160 - +
  • [4] XTC -: The XML transformation coordinator for XML document transformation technologies
    Foetsch, Daniel
    Speck, Andreas
    [J]. SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 507 - +
  • [5] Document transformation system from papers to XML data based on pivot XML document method
    Ishitani, Y
    [J]. SEVENTH INTERNATIONAL CONFERENCE ON DOCUMENT ANALYSIS AND RECOGNITION, VOLS I AND II, PROCEEDINGS, 2003, : 250 - 255
  • [6] A visual approach to XML document design and transformation
    Zhang, K
    Zhang, DQ
    Deng, Y
    [J]. IEEE SYMPOSIA ON HUMAN-CENTRIC COMPUTING LANGUAGES AND ENVIRONMENTS, PROCEEDINGS, 2001, : 312 - 319
  • [7] Refinement of correspondences in EXSMAL for XML document transformation
    Khaled, Herzi
    Benharkat, Aicha-Nabila
    Amghar, Youssef
    [J]. SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 304 - +
  • [8] XML document transformation with conditional random fields
    Gilleron, Remi
    Jousse, Florent
    Tellier, Isabelle
    Tommasi, Marc
    [J]. COMPARATIVE EVALUATION OF XML INFORMATION RETRIEVAL SYSTEMS, 2007, 4518 : 525 - 539
  • [9] On transformation of authorization policies
    Bai, Y
    Varadharajan, V
    [J]. DATA & KNOWLEDGE ENGINEERING, 2003, 45 (03) : 333 - 357
  • [10] Secure XML querying based on authorization graphs
    Chebotko, Artem
    Chang, Seunghan
    Lu, Shiyong
    Fotouhi, Farshad
    [J]. INFORMATION SYSTEMS FRONTIERS, 2012, 14 (03) : 617 - 632