期刊文献+

利用RBAC实现对XML文档的安全访问控制 被引量:2

Implementing Access Control on XML with RBAC
下载PDF
导出
摘要 XML日益成为互联网和局域网内数据交换的格式,对XML的访问控制成为越来越受关注的课题。XML表示的信息可能包含不同程度的敏感性数据,不同的用户对这些信息的访问权限是不同的。基于角色的访问控制是一种灵活、高效的访问控制方法,它通过角色把用户和权限相联系,极大降低了授权的复杂性。文中从角色、角色继承、授权等方面分析了如何利用RBAC实现对XML文档的安全访问控制。对XML的授权可以定义在schema,instance甚至元素和属性级别上,从而实现了对XML文档灵活的、多粒度的访问控制。 As XML has been increasingly important as a data-exchange format of Internet and Intranet, access control for XML rises as an attractive issue. XML document may include information at different levels of sensitivity, so different users have different permissions on those information. RBAC is a flexible and effective access control model, which connects users and permissions through roles, greatly reducing the complexity of authorizations. This paper analyzes how to realize secure access control for XML documents using RBAC from aspects of role, role hierarchy, authorization, etc. Authorizations on XML can be defined on schema, instance, even element and attribute, accordingly providing a flexible, multi-granularity access control for XML documents.
出处 《微机发展》 2005年第4期98-101,共4页 Microcomputer Development
  • 相关文献

参考文献6

  • 1王茹,宋瀚涛.XML文档结构定义规范—XML Schema[J].计算机应用研究,2002,19(1):127-129. 被引量:23
  • 2耿晖,王海波.基于XML的角色访问控制(RBAC)[J].计算机应用研究,2002,19(12):14-15. 被引量:12
  • 3Zhang Xinwen, Park J, Sandhu R. Schema - based XML Security: RBAC Approach[A]. 17th IFIP WG11.3 Working Conference on Data and Application Security[C]. Estes Park, Colorado, USA: [s. n. ], 2003.
  • 4Damiani E, di Vimercati S D C, Paraboschi S, et al. Securing XMLDocuments[A]. Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology, Proceedings Series: Lecture Notes inComputer Science, Vol. 1777[C]. London, UK: Springer -Verlag,2000. 121 - 135.
  • 5Damiani E, Vimercati S D C, Paraboschi S, et al. A Finegrained Access Control System for XML Documents[J ]. ACM Trans Information and System Sec, 2002,5(2): 169 - 202.
  • 6赵遐,怀进鹏.基于XML的多粒度访问控制系统[J].计算机工程与应用,2002,38(21):155-159. 被引量:10

二级参考文献14

  • 1Stephen Walther.Active Server Pages揭密[M].北京:北京希望电子工业出版社,1999..
  • 2Charles F Goldfarb Paul Prescod.XML实用技术[M].北京:清华大学出版社,1999..
  • 3[1]Satoshi Hada,Michiharu Kudo.XML Access Control Language[M].Tokyo Research Laboratory,IBM Research,2001
  • 4[2]Ravi S Sandhu. Role-Based Access Control. Laboratory for Information Security Technology ISSE Department,MS 4A4 GeorgeMason University, http://www.isse.gmu.edu/faculty/sandhu, 1997
  • 5[3]Michiharu Kudo,Satoshi Hada. XML Document Security based on Provisional Authorization[M].Tokyo Research Laboratory,IBM Research,2000
  • 6[4]T Bray et al. Extensible Markup language(XML)1.0.World Wide Web Consortium (W3C), http://www.w3c.org/TR/REC-xml, 1998
  • 7[5]XML Security Suite, alphaWorks.http://www.alphaWorks.com/tech/xmlsecuritysuite, 1999
  • 8[6]Entrust Technologies'XML Strategy for Authorization.2001
  • 9[7]Ernesto Damiani.Design and Implementation of an Access Control Processor for XML Documents. University di Milano,1999
  • 10.XMLSchema[]..2001

共引文献42

同被引文献15

  • 1李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 2高磊,詹毅.基于角色的多级文档安全访问控制模型设计[J].计算机仿真,2005,22(2):70-73. 被引量:4
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4[1]Lawrence A Gordon,Martin P Loeb,William Lucyshyn,et al.2006 CSI/FBI computer crime and security survey[DB/OL].http://www.gocsi.com/.
  • 5[2]Alapan Arnab,Andrew Hutchison.Digital fights management-An overview of current challenges and solutions[C].Procee-dings of the Fourth Annual Information Security South Africa Conference.Midrand,South Africa:Gallagher Estate,2004.
  • 6[3]Technical overview of windows rights management services[EB/OL].http://www.mierosoft.com/windowsserver2003/tec-hinfo/overview/rmenterprisewp.mspx.
  • 7[4]Bill Rosenblatt.Enterprise digital rights management techno logy comparison:Authentica active rights management and microsoft windows rights management services[DB/OL],http:// www.authentica.com/.
  • 8[5]Yang Yu,Chiueh Tzi-cker.Display-only file server:A solution against information theft due to insider attack[C].Proceedings of the 4th ACM Workshop on Digital Rights Management.Wa-shington,DC,USA:ACM Press,2004:31-39.
  • 9[6]AirZip FileSECURE 白皮书[EB/OL].http://www.airzip.com.cn/FileSECURE_white_papers.htm.
  • 10Ferraiolo D, Sandhu R, et al. Proposed NIST Standard for Role-Based Access Control [ J ]. ACM Transactions on Information and System Security ,2001,4( 3 ) : 224 - 274.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部