Security Analysis of Cryptographically Controlled Access to XML Documents

M Abadi, B Warinschi

    Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

    10 Citations (Scopus)

    Abstract

    Some promising recent schemes for XML access control employ encryption for implementing security policies on published data, avoiding data duplication. In this paper we study one such scheme, due to Miklau and Suciu. That scheme was introduced with some intuitive explanations and goals, but without precise definitions and guarantees for the use of cryptography (specifically, symmetric encryption and secret sharing). We bridge this gap in the present work. We analyze the scheme in the context of the rigorous models of modern cryptography. We obtain formal results in simple, symbolic terms close to the vocabulary of Miklau and Suciu. We also obtain more detailed computational results that establish security against probabilistic polynomial-time adversaries. Our approach, which relates these two layers of the analysis, continues a recent thrust in security research and may be applicable to a broad class of systems that rely on cryptographic data protection.
    Translated title of the contributionSecurity analysis of cryptographically controlled access to XML documents
    Original languageEnglish
    Title of host publicationSymposium on Principles of Database Systems - PODS 2005
    PublisherAssociation for Computing Machinery
    Pages108 - 117
    Number of pages10
    Volume-
    ISBN (Print)1595930620
    DOIs
    Publication statusPublished - 2005

    Bibliographical note

    Conference Organiser: ACM

    Fingerprint

    Dive into the research topics of 'Security Analysis of Cryptographically Controlled Access to XML Documents'. Together they form a unique fingerprint.

    Cite this