scispace - formally typeset
Proceedings ArticleDOI

Bitmap based cryptographic access control for restricted views of XML documents

K. Ganesan, +1 more
- pp 140-146
Reads0
Chats0
TLDR
The present paper combines the bitmap based access control approach with cryptography, to generate the ePath level access control using a two dimensional access control matrix itself instead of using three dimensional security cubes.
Abstract
With the proliferation of more and more mobile devices for data access, there seems to be a great deal of demand in filtering the web content according to the user's choice or according to the capabilities of the client terminal. For this purpose, the so called restricted views of XML documents, created dynamically are very helpful. In the present paper, we combine the bitmap based access control approach with cryptography, to generate the ePath level access control using a two dimensional access control matrix itself instead of using three dimensional security cubes. In our approach redundant storage space needed at the server for saving the various (statically generated) restricted views of the XML documents are avoided. As cryptography is also utilized in our access control mechanism, it is likely to be secure than the bitmap based access control models.

read more

Citations
More filters
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Journal Article

XML Access Control: Mapping XACML Policies to Relational Database Tables

TL;DR: A new mapping technique to map XACML policies and rules into relational rules and store them in tables to ease the access control of the XML documents is proposed.
References
More filters
Journal ArticleDOI

A fine-grained access control system for XML documents

TL;DR: This work presents an access control model to protect information distributed on the Web that, by exploiting XML's own capabilities, allows the definition and enforcement of access restrictions directly on the structure and content of the documents.
Journal ArticleDOI

Secure and selective dissemination of XML documents

TL;DR: This article defines a formal model of access control policies for XML documents and proposes an approach, based on an extension of the Cryptolope#8482; approach, which essentially allows one to send the same document to all users, and yet to enforce the statedAccess control policies.
Journal ArticleDOI

Specifying and enforcing access control policies for XML document sources

TL;DR: This paper proposes access control policies and an associated model for XML documents, addressing peculiar protection requirements posed by XML, and allows the Security Administrator to choose different policies for documents not covered or only partially covered by the existingAccess control policies for document types.
Journal ArticleDOI

Views in a Large Scale XML Repository

TL;DR: The solution is based on a simple view definition language that allows for automatic generation of views and enables a distributed implementation of the view system that is scalable both in terms of data and load.
Book

Beginning XML

TL;DR: This book teaches you all you need to know about XML - what it is, how it works, what technologies surround it, and how it can best be used in a variety of situations, from simple data transfer to using XML in your web pages.
Related Papers (5)