Extracting global policies for efficient access control of XML documents

Mizuho Iwaihara*, Bo Wang, Somchai Chatvichienchai

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

As documents containing sensitive information are exchanged over the Internet, access control of XML documents is becoming important. Access control policies can specify fine-grained rules to documents, but policies sometimes become redundant, as documents are restructured or combined during exchange. In this paper, we consider a new approach of optimizing access control policies, by extracting distribution information of given authorization values within XML data, The extracted information is called a global policy tree, and it can be utilized for minimizing the total size of policies as well as efficient query processing, We present a linear-time algorithm for minimizing policies utilizing global policy trees, and our evaluation results show significant improvement over existing work.

Original languageEnglish
Title of host publicationWeb Information Systems Engineering, WISE 2005 - 6th International Conference on Web Information Systems Engineering, Proceedings
Pages161-174
Number of pages14
DOIs
Publication statusPublished - 2005
Externally publishedYes
Event6th International Conference on Web Information Systems Engineering, WISE 2005 - New York, NY, United States
Duration: 2005 Nov 202005 Nov 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3806 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Web Information Systems Engineering, WISE 2005
Country/TerritoryUnited States
CityNew York, NY
Period05/11/2005/11/22

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Extracting global policies for efficient access control of XML documents'. Together they form a unique fingerprint.

Cite this