Static analysis of XML security views and query rewriting.pdf

Static analysis of XML security views and query rewriting.pdf

  1. 1、本文档共28页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Static analysis of XML security views and query rewriting.pdf

Information and Computation 238 (2014) 2–29 Contents lists available at ScienceDirect Information and Computation /locate/yinco Static analysis of XML security views and query rewriting ? Beno?t Groz a,b,d,?, S?awomir Staworko a,c, Anne-Cecile Caron a,b, Yves Roos a,b, Sophie Tison a,b a Mostrare Project, INRIA Lille Nord-Europe LIFL (CNRS UMR8022), France b University of Lille 1, France c University of Lille 3, France d ENS Cachan, France article info Article history: Received 25 February 2011 Available online 21 July 2014 Keywords: XML Security views Query rewriting Determinacy abstract In this paper, we revisit the view based security framework for XML without imposing any of the previously considered restrictions on the class of queries, the class of DTDs, and the type of annotations used to de?ne the view. First, we study query rewriting with views when the classes used to de?ne queries and views are Regular XPath and MSO. Next, we investigate problems of static analysis of security access speci?cations (SAS): we introduce the novel class of interval-bounded SAS and we de?ne three different manners to compare views (i.e. queries) from a security point of view. We provide a systematic study of the complexity for deciding these three comparisons, when the depth of the XML documents is bounded, when the document may have an arbitrary depth but the queries de?ning the views are restricted to guarantee the interval-bounded property, and in the general setting without restriction on queries and document. ? 2014 Elsevier Inc. All rights reserved. 1. Introduction The wide acceptance of XML as the format for data representation and exchange clearly demonstrates the need for a general and ?exible framework of secure access for XML databases. While security speci?cation and enforcement are well established in relational databases, their methods and approaches cannot be easily adapted to XML databases. This is because an XML document stores information not only in its dat

您可能关注的文档

文档评论(0)

2752433145 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档