Jan Krzysztof Miziołek’s research while affiliated with University of Warsaw and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


Figure 5.
Figure 6.
Figure 8.
Secure Publishing using Schema-level Role-based Access Control Policies for Fragments of XML Documents
  • Conference Paper
  • Full-text available

July 2008

·

34 Reads

·

1 Citation

·

Robin McNeill

·

Jan Krzysztof Miziołek

Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.

Download

Succinct Access Control Policies for Published XML Datasets.

January 2008

·

58 Reads

·

5 Citations

We consider the setting of secure publish ing of XML documents, in which read-only access control policies (ACPs) over static XML datasets are enforced using cryptographic keys. The role-based access control ( RBAC) model provides a flexible method for specifying suc h policies. Extending the RBAC model to include role parameterization addresses the problem of role prol iferation which can occur in large scale systems. I n this paper, we describe the complete design of a paramet erized RBAC (PRBAC) model for XML documents. We also describe algorithms for generating the minimum number of keys required to enforce an arbitrary PR BAC policy; for distributing to each user only keys nee ded for decrypting accessible nodes; and for applyi ng the minimal number of encryption operations to an XML document required to satisfy the protection requirem ents of the policy. The time complexity of our approach is linear w.r.t. document size and the number of ro les.


Citations (5)


... Additionally, in the column-store environment, the contents of a single entity is often stored in many locations, which then requires additional logic to combine the attributes for joining and grouping attributes; (this is exactly how many permuting XML compressors work). Also, in [Fry, 2011] and [Corbin et al., 2013] XSAQCT was compared to many different XML-database engines using the BerkelyDB Key-value database, and the results were promising. Figure 2 depicts the architectural layout of a modified XSAQCT. ...

Reference:

Column-Oriented Database Systems and XML Compression
Parallelization of Permuting XML Compressors
  • Citing Conference Paper
  • May 2014

Lecture Notes in Computer Science

... Authors in [17] provide fine comparison between Column-Oriented Database Systems and XML their work explained the relationships between XML compressors and column-stores. They illustrated that a permuting XML compressor, called XSAQCT with the DBMS back-end has essentially the same functionality as a column-store (while ignoring things such as SQL Joins), including in their work a specific kind of compression, Also they test the compression ratio achieved with the compressor they made, experiments were performed on an XML corpus and the test showed a very good results that make their work strong an applicable to use instead of the XML they also describes the existing XML compressor showing the similar inherent between its compression technique and column-stores. ...

Column-oriented Database Systems and XML Compression
  • Citing Article
  • January 2014

... This paper investigates succinct, client-based implementation of RBAC policies for schema-less XML documents. The policy for the XML document D can specify occurrences of individual nodes of D, entire subtrees of D or specific text elements in D. The compression process is based on an XML compressor, called XSAQCT, see [19] and [20], (for details, see Section II). However, the designer of policies does not need to be aware of inner-workings of this compressor, or the encryption tools. ...

XSAQCT: XML Queryable Compressor

... There are other online compressors, e.g., TREECHOP [12], but XSAQCT has a number of distinctive features, such as it is queryable using lazy decompression (i.e., with minimal decompression) and updateable [7], and finally it can be parallelized to execute faster on multi-core machines [13]. Various possible educational applications of XSAQCT are described in [14]. Similarly to TREECHOP, XSAQCT supports both the compression where the decompressor's output is exactly the same as the original input (including the white space), and generating a canonicalized [15] XML document. ...

Updateable Educational Applications based on Compressed XML Documents.
  • Citing Conference Paper
  • January 2011

... More precisely, the problem lies in handling the task of assigning a single role to each user which can be complicated in this case. Role parameterization have been proved to be an efficient solution in these types of scenarios [65]. The global proposed RBAC/WoT architecture, as explained in the paper, can be summarized in of permission that will grant privileges to the users and eventually the Objects. ...

Parameterized Role-Based Access Control Policies for XML Documents

Information Security Journal A Global Perspective