TY - GEN
T1 - Incremental adaptation of XPath access control views
AU - Ayyagari, Padmapriya
AU - Mitra, Prasenjit
AU - Lee, Dongwon
AU - Liu, Peng
AU - Lee, Wang Chien
PY - 2007
Y1 - 2007
N2 - Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view must be adapted to reflect these changes. The process of updating a materialized view after its definition changes is referred to as view adaptation. While XPath security views have been widely reported in literature, the problem of view adaptation for XPath security views has not been addressed. View adaptation results in view downtime during which users are denied access to security views to prevent unauthorized access. Thus, efficient view adaptation is important for making XPath security views pragmatic. In this work, we show how to adapt an XPath access-control view incrementally by re-using the existing view, which reduces computation and communication costs significantly, and results in less downtime for the end-user. Empirical evaluations confirm that the incremental view adaptation algorithms presented in this paper are efficient and scalable.
AB - Materialized XPath access-control views are commonly used for enforcing access control. When access control rules defining a materialized XML access-control view change, the view must be adapted to reflect these changes. The process of updating a materialized view after its definition changes is referred to as view adaptation. While XPath security views have been widely reported in literature, the problem of view adaptation for XPath security views has not been addressed. View adaptation results in view downtime during which users are denied access to security views to prevent unauthorized access. Thus, efficient view adaptation is important for making XPath security views pragmatic. In this work, we show how to adapt an XPath access-control view incrementally by re-using the existing view, which reduces computation and communication costs significantly, and results in less downtime for the end-user. Empirical evaluations confirm that the incremental view adaptation algorithms presented in this paper are efficient and scalable.
UR - http://www.scopus.com/inward/record.url?scp=34748827406&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=34748827406&partnerID=8YFLogxK
U2 - 10.1145/1229285.1229303
DO - 10.1145/1229285.1229303
M3 - Conference contribution
AN - SCOPUS:34748827406
SN - 1595935746
SN - 9781595935748
T3 - Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
SP - 105
EP - 116
BT - Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
T2 - 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
Y2 - 20 March 2007 through 22 March 2007
ER -