Abstract
With the fast development of the Web, a web document source periodically broadcasts its document to multiple users. The web document could contain the sensitive information and it should be sent to users who have an authority accessing the sensitive information. In a well-known method, called XML Pool Encryption, the sensitive information is separated from the document, and then, it is encrypted. Therefore, reconstruction of a document is required when the document is shown to a user. For the reconstruction, it is very important that we identify the location of decrypted information effectively and efficiently. In this paper, we propose a labeling scheme to support the fast reconstruction of document, based on the use of encryption techniques. The proposed labeling scheme supports the inference of structure information in any portion of the document. In the experimental results, our labeling scheme shows an efficiency in searching for the location of decrypted information.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Abiteboul, S., Bunneman, P., Suciu, D.: Data on the Web:From Relations to Semi-structured Data and XML. Morgan Kaufmann, San Francisco (1999)
Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Controlled access and dissemination of xml document. In: ACM Web Information and Data Management, pp. 22–27 (1999)
Damiani, E., di Vidercati, S.D.C., Paraboschi, S., Samarati, P.: Securing xml documents. In: EDBT, pp. 121–135 (2000)
Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: A fine-grained access control system for xml documents. ACM Transactions on Information and System Security 5(2), 169–202 (2002)
Geuer-Pollmann, C.: Xml pool encryption. In: ACM Workshop on XML Security, pp. 1–9 (2002)
IBM. Xml security suite, http://www.alphawowks.ibm.com/tech/xmlsecuritysuite
Ley, M.: Dblp database web site (2000), http://www.alphawowks.ibm.com/tech/xmlsecuritysuite
Schmidt, A., Wass, F., Kersten, M.L., Carey, M.J., Manolescu, I., Busse, R.: Xmark: A benchmark for xml data management. In: VLDB, pp. 974–985 (2002)
Sun. Java (2005), http://java.sun.com
W3C. Xpath, http://www.w3c.org/TR/XPath
W3C. Xml encryption wg (2001), http://www.w3.org/Encryption/2001/
W3C. Xml-signature syntax and processing (2002), http://www.w3.org/TR/xmldsig-core/
W3C. extensible markup language (xml) 1.0 (2004), http://www.w3.org/TR/REC-xml/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, MJ., Ko, HK., Lee, S. (2006). A Novel Labeling Scheme for Secure Broadcasting of XML Data. In: Nayak, R., Zaki, M.J. (eds) Knowledge Discovery from XML Documents. KDXD 2006. Lecture Notes in Computer Science, vol 3915. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11730262_12
Download citation
DOI: https://doi.org/10.1007/11730262_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33180-3
Online ISBN: 978-3-540-33181-0
eBook Packages: Computer ScienceComputer Science (R0)