Authorization-Transparent Access Control for XML Under the Non-Truman Model
نویسندگان
چکیده
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Truman and the Non-Truman are two approaches to authorization transparency where in a Truman model, queries that violate the access restrictions are modified transparently by the system to only reveal accessible data, while in a Non-Truman model, such queries are rejected. The advantage of a Non-Truman model is that the semantics of user queries is not changed by the access control mechanism. This work presents an access control mechanism for XML under the Non-Truman model. Security policies are specified as parameterized rules formulated using XPath. The rules specify relationships between elements that should be concealed from users. Hence, not only elements, but also edges and paths within an XML document, can be concealed. The access control mechanism authorizes only valid queries, i.e., queries that do not disclose the existence of concealed relationships. The additional expressive power, provided by these rules, over element-based authorization techniques is illustrated and algorithms that check the validity of queries are provided. The proposed access control mechanism can either serve as a substitute for views or as a layer that verifies the specific relationships are concealed by a view.
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملA Policy Validation Framework for Enterprise Authorization Specification
The validation of enterprise authorization specification for conformance to enterprise security policies requires an out-of-band framework in many situations since the enforcing access control mechanism does not provide this feature. In this paper we describe one such framework. The framework uses XML to encode the enterprise authorization specification, XML Schema to specify the underlying acc...
متن کاملAn Approach of Query Request Authorization Process for the Access Control System to XML Documents
Access control is one of the fundamental security mechanisms in information systems. When a multi-user system uses XML documents as data storage, the need of access control to XML documents arises. Due to the hierarchical structure, XML access control is finegrained in nature. For this criterion, instead of controlling access to the whole XML document, it is possible to limit user access to sub...
متن کاملUsing Usage Control to Access XML Databases
XML documents usually contain private information that cannot be shared by every user communities. It is widely used in web environment. XML database is becoming increasingly important since it consists of XML documents. Several applications for supporting selective access to data are available over the web. Usage control has been considered as the next generation access control model with dist...
متن کامل