Affiliation:
1. University of Milano, Milano, Italy
2. University of Insubria, Como, Italy
Abstract
XML (
eXtensible Markup Language
) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations that these users have. In this article, we make several contributions to the problem of secure and selective dissemination of XML documents. First, we define a formal model of access control policies for XML documents. Policies that can be defined in our model take into account both user profiles, and document contents and structures. We also propose an approach, based on an extension of the Cryptolope™ approach [Gladney and Lotspiech 1997], which essentially allows one to send the same document to all users, and yet to enforce the stated access control policies. Our approach consists of encrypting different portions of the same document according to different encryption keys, and selectively distributing these keys to the various users according to the access control policies. We show that the number of encryption keys that have to be generated under our approach is minimal and we present an architecture to support document distribution.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
152 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hierarchical Key Assignment Schemes with Key Rotation;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
2. Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
3. Ethical Considerations and Challenges;City Development: Issues and Best Practices;2024
4. Compound Keyword Level Search to conserve Privacy in access of Encrypted Cloud;International Journal of Advanced Research in Science, Communication and Technology;2022-05-23
5. The security and privacy aspects in semantic web enabled IoT-based healthcare information systems;Semantic Models in IoT and eHealth Applications;2022