Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Security Analysis of Cryptographically Controlled Access to XML Documents
 

Summary: Security Analysis of Cryptographically Controlled
Access to XML Documents
MART´IN ABADI
University of California, Santa Cruz, and Microsoft Research, Silicon Valley, USA
and
BOGDAN WARINSCHI
University of Bristol, UK
Some promising recent schemes for XML access control employ encryption for implementing se-
curity policies on published data, avoiding data duplication. In this paper we study one such
scheme, due to Miklau and Suciu. That scheme was introduced with some intuitive explanations
and goals, but without precise definitions and guarantees for the use of cryptography (specifically,
symmetric encryption and secret sharing). We bridge this gap in the present work. We analyze
the scheme in the context of the rigorous models of modern cryptography. We obtain formal
results in simple, symbolic terms close to the vocabulary of Miklau and Suciu. We also obtain
more detailed computational results that establish security against probabilistic polynomial-time
adversaries. Our approach, which relates these two layers of the analysis, continues a recent thrust
in security research and may be applicable to a broad class of systems that rely on cryptographic
data protection.
Categories and Subject Descriptors: E.3 [Data Encryption]: ; H.2.7 [Database Administra-
tion]: Security, integrity, and protection; F.1.1 [Models of Computation]: Relations between

  

Source: Abadi, Martín - Department of Computer Science, University of California at Santa Cruz

 

Collections: Computer Technologies and Information Sciences