Proceedings ArticleDOI
Bitmap based cryptographic access control for restricted views of XML documents
K. Ganesan,A.J. Mohamed Jamal +1 more
- pp 140-146
Reads0
Chats0
TLDR
The present paper combines the bitmap based access control approach with cryptography, to generate the ePath level access control using a two dimensional access control matrix itself instead of using three dimensional security cubes.Abstract:
With the proliferation of more and more mobile devices for data access, there seems to be a great deal of demand in filtering the web content according to the user's choice or according to the capabilities of the client terminal. For this purpose, the so called restricted views of XML documents, created dynamically are very helpful. In the present paper, we combine the bitmap based access control approach with cryptography, to generate the ePath level access control using a two dimensional access control matrix itself instead of using three dimensional security cubes. In our approach redundant storage space needed at the server for saving the various (statically generated) restricted views of the XML documents are avoided. As cryptography is also utilized in our access control mechanism, it is likely to be secure than the bitmap based access control models.read more
Citations
More filters
Journal ArticleDOI
Book review: Applied cryptography: Protocols, algorithms, and source code in C
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Journal Article
XML Access Control: Mapping XACML Policies to Relational Database Tables
TL;DR: A new mapping technique to map XACML policies and rules into relational rules and store them in tables to ease the access control of the XML documents is proposed.
References
More filters
Journal ArticleDOI
A fine-grained access control system for XML documents
TL;DR: This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents.
Journal ArticleDOI
Secure and selective dissemination of XML documents
Elisa Bertino,Elena Ferrari +1 more
TL;DR: This article defines a formal model of access control policies for XML documents and proposes an approach, based on an extension of the Cryptolope#8482; approach, which essentially allows one to send the same document to all users, and yet to enforce the statedAccess control policies.
Journal ArticleDOI
Specifying and enforcing access control policies for XML document sources
TL;DR: This paper proposes access control policies and an associated model for XML documents, addressing peculiar protection requirements posed by XML, and allows the Security Administrator to choose different policies for documents not covered or only partially covered by the existingAccess control policies for document types.
Journal ArticleDOI
Views in a Large Scale XML Repository
TL;DR: The solution is based on a simple view definition language that allows for automatic generation of views and enables a distributed implementation of the view system that is scalable both in terms of data and load.
Book
Beginning XML
TL;DR: This book teaches you all you need to know about XML - what it is, how it works, what technologies surround it, and how it can best be used in a variety of situations, from simple data transfer to using XML in your web pages.
Related Papers (5)
An efficient yet secure XML access control enforcement by safe and correct query modification
Changwoo Byun,Seog Park +1 more