{"title":"用于XML关联的模式级过滤的树自动机","authors":"V. Gowadia, C. Farkas","doi":"10.5220/0002575502980308","DOIUrl":null,"url":null,"abstract":"In this paper we present query-filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represent security objects and to express the security policy. We present the concepts of a simple security object and an association security object. Our model allows us to express and enforce access control on XML trees and their associations. We propose a query-filtering technique that evaluates XML queries to detect disclosure of association-level security objects. We use tree automata to model-security objects. Intuitively a query Q discloses a security object o if and only if the (tree) automata corresponding to o accepts Q. We show that our schema-level method detects all possible disclosures, i.e., it is complete.","PeriodicalId":54767,"journal":{"name":"Journal of Research and Practice in Information Technology","volume":"1 1","pages":"136-145"},"PeriodicalIF":0.0000,"publicationDate":"2018-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Tree Automata for Schema-Level Filtering of XML Associations\",\"authors\":\"V. Gowadia, C. Farkas\",\"doi\":\"10.5220/0002575502980308\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we present query-filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represent security objects and to express the security policy. We present the concepts of a simple security object and an association security object. Our model allows us to express and enforce access control on XML trees and their associations. We propose a query-filtering technique that evaluates XML queries to detect disclosure of association-level security objects. We use tree automata to model-security objects. Intuitively a query Q discloses a security object o if and only if the (tree) automata corresponding to o accepts Q. We show that our schema-level method detects all possible disclosures, i.e., it is complete.\",\"PeriodicalId\":54767,\"journal\":{\"name\":\"Journal of Research and Practice in Information Technology\",\"volume\":\"1 1\",\"pages\":\"136-145\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-04-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Research and Practice in Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5220/0002575502980308\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Research and Practice in Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5220/0002575502980308","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Tree Automata for Schema-Level Filtering of XML Associations
In this paper we present query-filtering techniques based on bottom-up tree automata for XML access control. In our authorization model (RXACL), RDF statements are used to represent security objects and to express the security policy. We present the concepts of a simple security object and an association security object. Our model allows us to express and enforce access control on XML trees and their associations. We propose a query-filtering technique that evaluates XML queries to detect disclosure of association-level security objects. We use tree automata to model-security objects. Intuitively a query Q discloses a security object o if and only if the (tree) automata corresponding to o accepts Q. We show that our schema-level method detects all possible disclosures, i.e., it is complete.