Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.8.019

Access Control for Efficient Query Processing on Limited Resource Mobile Terminal  

An, Dong-Chan (Dept. of Multimedia Contents, Shin Ansan University)
Abstract
Access control that has been previously performed mainly on safety, and thus not much effort has been done to consider access control in terms of efficiency. This paper proposes a method for an efficient and secure query processing of XML data streams, such as a personal digital assistant and a portable terminal, at the client side with limited resources. Specifically, this paper proposes an access control processing that possesses a small overhead for attaining a secure result with limited memory and a method to enhance the performance, finding the parts capable of optimizing each processing step for offsetting the overhead caused by the addition of access control processing. The superiority of the new method is analyzed through an experiments.
Keywords
Access Control; Query Processing; Limited Resource; XML;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Lindner and J. Meier "Towards a Secure Data Str eam Management System," VLDB Workshop TEAA 2005.
2 E. Damiani, S. Vimercati, S. Paraboachk and P. Sam arati, "Design and Implementation of Access Control Processor for XML Documents", Computer Network, pp. 59-75, 2000.
3 E. Damiani, S. Vimercati, S. Paraboachk and P. Sa marati, "A Fine-grained Access Control System for XML Documents", ACM Trans Information and System Sec., Vol5, No2, pp. 169-202, May 2002.   DOI
4 E. Bertino, S. Castano, E. Ferrari, and M. Mesiti, "Specifying and Enforcing Access Control Policies for XML Document Sources", WWW Journal, Vol3, No3, pp. 139-151, 2000.
5 E. Bertino, S. Castano, and E. Ferrai "Securing XML documents with Author-x", IEEE Internet Computing, May June, pp. 21-31, 2001.
6 J. Cai, C. K. Poon, "OrdPathX: Supporting Two Dim ensions of Node Insertion in XML Data", in proceeding of DEXA, pp. 332-339, 2009.
7 W. Liang, A. Takahashi, H. Yokota, "A Low-Storag e-Consumption XML Labeling Method for Efficient Structural Information Extraction", in proceeding of DEXA, pp. 7-22, 2009.
8 M. Murata, A. Tozawa, and M. Kudo, "XML Access Control Using Static Analysis", in proceedings of ACM Conference on Computer and Communications Security, pp. 73-84, 2003.
9 B. Luo, D. W. Lee, W. C. Lee, and P. Liu, "Qfilter: Fine-grained Run-Time XML Access Control via NFA-based Query Rewriting," CIKM'04, pp. 543-552, 2004.
10 L. Bouganim, F. D. Ngoc, and P. Pucheral, "Client-based access control management for XML documents," VLDB, pp. 84-95, 2004.
11 F. Rabitti, E. Bertino, W. Kim and D. Woelk, "A Mo del of Authorization for Next-Generation Database Systems", ACM Transaction on Database Systems, 126(1), pp. 88-131, March 1991.
12 E. Damiani, M. Fansi, A. Gabillon, S. Marrara, "A general approach to securely querying XML", Computer Standards & Interfaces 30(6), pp. 379-389, 2008.   DOI   ScienceOn
13 A. Berglund, S. Boag, D. Chamberlin, M. F. Fernandez, M. Kay, J. Robie, and J. Simeon XPath 2.0, World Wide Web Consortium (W3C), 2007.
14 T. Bray, J. Paoli, C. M. Sperberg-McQueen, E. Mal er, F. Yergeau eXtensible Markup Language (XML) 1.0, World Wide Web Consortium (W3C), 2004.