Affiliation:
1. North Carolina State University
2. AT&T Labs--Research, NJ
3. University of British Columbia
4. University of Michigan, Ann Arbor
Abstract
XML is the undisputed standard for data representation and exchange. As companies transact business over the Internet, letting authorized customers directly access, and even modify, XML data offers many advantages in terms of cost, accuracy, and timeliness. Given the complex business relationships between companies, and the sensitive nature of information, access must be provided selectively, using sophisticated access control specifications. Using the specification directly to determine if a user has access to an XML data item can be extremely inefficient. The alternative of fully materializing, for each data item, the users authorized to access it can be space-inefficient. In this article, we introduce a compressed accessibility map (CAM) as a space- and time-efficient solution to the access control problem for XML data. A CAM compactly identifies the XML data items to which a user has access, by exploiting structural locality of accessibility in tree-structured data. We present a CAM lookup algorithm for determining if a user has access to a data item that takes time proportional to the product of the depth of the item in the XML data and logarithm of the CAM size. We develop an algorithm for building an optimal size CAM that takes time linear in the size of the XML data set. While optimality cannot be preserved incrementally under data item updates, we provide an algorithm for incrementally maintaining near-optimality. Finally, we experimentally demonstrate the effectiveness of the CAM for multiple users on a variety of real and synthetic data sets.
Publisher
Association for Computing Machinery (ACM)
Reference29 articles.
1. Access Control. 1998. Access control programmer's guide. Available from http://developer. netscape.com:80/docs/manuals/enterprise/accessapi/contents.htm.]] Access Control. 1998. Access control programmer's guide. Available from http://developer. netscape.com:80/docs/manuals/enterprise/accessapi/contents.htm.]]
2. Securing XML documents with Author-X
3. Controlled access and dissemination of XML documents
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献