QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata

被引:7
|
作者
Luo, Bo [1 ]
Lee, Dongwon [2 ]
Lee, Wang-Chien [2 ]
Liu, Peng [2 ]
机构
[1] Univ Kansas, Lawrence, KS 66045 USA
[2] Penn State Univ, University Pk, PA 16802 USA
来源
VLDB JOURNAL | 2011年 / 20卷 / 03期
基金
美国国家科学基金会;
关键词
XML; Security; Access control; NFA; ACCESS-CONTROL;
D O I
10.1007/s00778-010-0202-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we ask whether XML access control can be supported when underlying (XML or relational) storage system does not provide adequate security features and propose three alternative solutions-primitive, pre-processing, and post-processing. Toward that scenario, in particular, we advocate a scalable and effective pre-processing approach, called QFilter. QFilter is based on non-deterministic finite automata (NFA) and rewrites user's queries such that parts violating access control rules are pre-pruned. Through analysis and experimental validation, we show that (1) QFilter guarantees that only permissible portion of data is returned to the authorized users, (2) such access controls can be efficiently enforced without relying on security features of underlying storage system, and (3) such independency makes QFilter capable of many emerging applications, such as in-network access control and access control outsourcing.
引用
收藏
页码:397 / 415
页数:19
相关论文
共 32 条
  • [1] QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
    Bo Luo
    Dongwon Lee
    Wang-Chien Lee
    Peng Liu
    The VLDB Journal, 2011, 20 : 397 - 415
  • [2] Non-Deterministic Finite Cover Automata
    Campeanu, Cezar
    SCIENTIFIC ANNALS OF COMPUTER SCIENCE, 2015, 25 (01) : 3 - 28
  • [3] On the power of non-deterministic quantum finite automata
    Nakanishi, M
    Indoh, T
    Hamaguchi, K
    Kashiwabara, T
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (02) : 327 - 332
  • [4] Minimizing a Class of Non-Deterministic Finite Automata
    Zhang, Li
    ASIA-PACIFIC YOUTH CONFERENCE ON COMMUNICATION TECHNOLOGY 2010 (APYCCT 2010), 2010, : 471 - 474
  • [6] Edge-minimization of non-deterministic finite automata
    Melnikov B.F.
    Melnikova A.A.
    Korean Journal of Computational and Applied Mathematics, 2001, 8 (3): : 469 - 479
  • [7] FINITE-MEMORY AUTOMATA WITH NON-DETERMINISTIC REASSIGNMENT
    Kaminski, Michael
    Zeitlin, Daniel
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (05) : 741 - 760
  • [8] Edge-minimization of non-deterministic finite automata
    Melnikov, B.F.
    Melnikova, A.A.
    Korean Journal of Computational and Applied Mathematics, 2001, 8 (03): : 469 - 479
  • [9] Edge-minimization of non-deterministic finite automata
    Melnikov, B.F.
    Melnikova, A.A.
    Journal of Applied Mathematics and Computing, 2001, 8 (03) : 469 - 479
  • [10] NON-DETERMINISTIC 2-TAPE AUTOMATA ARE MORE POWERFUL THAN DETERMINISTIC ONES
    BRAUER, W
    LANGE, KJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 182 : 71 - 79