A trace semantics for positive core XPath

We provide a novel trace semantics for positive core XPath that exposes all intermediate nodes visited by the query engine. This enables a detailed analysis of all information relevant to the query. We give two examples of such analyses in the form of access control policies. We translate positive core XPath into linear temporal logic, showing that branching structures can be linearised effectively. We use the SPIN model checker in a proof of concept implementation to resolve the queries, and to perform access control. The performance of the implementation is competitive.

[1]  P. Wadler Two semantics for XPath , 2000 .

[2]  M. de Rijke,et al.  CTL model checking for processing simple XPath queries , 2004, Proceedings. 11th International Symposium on Temporal Representation and Reasoning, 2004. TIME 2004..

[3]  Torsten Grust,et al.  Accelerating XPath evaluation in any RDBMS , 2004, TODS.

[4]  L. Afanasiev,et al.  XML query evaluation via CTL symbolic model checking , 2004 .

[5]  Maarten Marx,et al.  Specifying access control policies for XML documents with XPath , 2004, SACMAT '04.

[6]  Paul Gastin,et al.  Fast LTL to Büchi Automata Translation , 2001, CAV.

[7]  Shin Nakajima,et al.  The SPIN Model Checker : Primer and Reference Manual , 2004 .

[8]  Peter Buneman,et al.  Edinburgh Research Explorer Path Queries on Compressed XML , 2022 .

[9]  Georg Gottlob,et al.  Efficient Algorithms for Processing XPath Queries , 2002, VLDB.

[10]  Gabriel M. Kuper,et al.  Structural Properties of XPath Fragments , 2003, ICDT.

[11]  Peng Liu,et al.  QFilter: fine-grained run-time XML access control via NFA-based query rewriting , 2004, CIKM '04.

[12]  Makoto Murata,et al.  XML access control using static analysis , 2006, TSEC.

[13]  Elisa Bertino,et al.  Securing XML Documents with Author-X , 2001, IEEE Internet Comput..

[14]  Steven J. DeRose,et al.  XML Path Language (XPath) , 1999 .

[15]  Ioana Manolescu,et al.  XMark: A Benchmark for XML Data Management , 2002, VLDB.

[16]  Steven J. DeRose,et al.  XML Path Language (XPath) Version 1.0 , 1999 .

[17]  Dan Suciu,et al.  Controlling Access to Published Data Using Cryptography , 2003, VLDB.

[18]  Maarten Marx,et al.  Conditional XPath, the first order complete XPath dialect , 2004, PODS.

[19]  Theo C. Ruys,et al.  Optimal Scheduling Using Branch and Bound with SPIN 4.0 , 2003, SPIN.

[20]  Mark Ryan,et al.  Logic in Computer Science: Modelling and Reasoning about Systems , 2000 .

[21]  Wenfei Fan,et al.  Secure XML querying with security views , 2004, SIGMOD '04.

[22]  Elisa Bertino,et al.  Specifying and enforcing access control policies for XML document sources , 2004, World Wide Web.

[23]  Gerard J. Holzmann,et al.  Model-Driven Software Verification , 2004, SPIN.

[24]  M. de Rijke,et al.  Semantic characterizations of navigational XPath , 2005, SGMD.

[25]  Luca de Alfaro,et al.  Model Checking the World Wide Web , 2001, CAV.

[26]  Georg Gottlob,et al.  XPath processing in a nutshell , 2003, SGMD.

[27]  Philippe Schnoebelen,et al.  The Complexity of Temporal Logic Model Checking , 2002, Advances in Modal Logic.

[28]  Michael Huth Logic In Computer Science , 1999 .

[29]  Stephan Merz,et al.  Model Checking , 2000 .

[30]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[31]  Xiang Fu,et al.  Analysis of interacting BPEL web services , 2004, WWW '04.

[32]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[33]  Maarten Marx,et al.  XPath with Conditional Axis Relations , 2004, EDBT.

[34]  Philip Wadler,et al.  Packrat parsing:: simple, powerful, lazy, linear time, functional pearl , 2002, ICFP '02.

[35]  Tim Furche,et al.  XPath: Looking Forward , 2002, EDBT Workshops.