期刊文献+

一种基于NFA查询重写的XML过滤技术

NFA-Based Query Rewriting for XML Filtering
下载PDF
导出
摘要 研究了可扩展的标志性语言(XM L)存取控制策略。通过基于不确定的自动机(NFA)的XM L查询重写技术,实现了支持精细粒度的XM L文档存取控制策略。通过构造XM L文档存取控制策略的NFA以及基于NFA的查询语句重写技术,有效地实现了独立于视图的、高效的XM L精细粒度的存取控制。 This paper studies XML access control and introduces an NFA-based query rewriting technique, which supports fine-grained access control for XML documents. An efficient access control policy enforcement method is achieved by building NFAs of XML access control policies and rewriting queries based on NFAs.
出处 《华东理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2006年第8期970-975,共6页 Journal of East China University of Science and Technology
基金 国家自然科学基金项目(60473055 60373075) 上海市浦江人才计划项目(05PJ14030)
关键词 XML 存取控制 视图 查询重写 XML access control view query rewriting
  • 相关文献

参考文献9

  • 1World Wide Web consortium(w3c).Extensible markup language (XML) 1.0 (Third Edition)[EB/OL].http://www.w3.org/TR/2004/REC-xml-20040204,2004
  • 2Bertino E,Secure E F.Dissemination of XML documents[J].ACM Transactions on Information and System Security,2002,5(3):290-331.
  • 3Damiani E,Vimercati S,Paraboschi S,et al.A fine-granied access control system for XML documents[J].ACM TISSEC,2002,5(2):169-202.
  • 4Damiani E,Vimercati S,Paraboschi S,et al.Design and implementation of an access control processor for XML documents[J].Computer Networks,2003,33(6):59-75.
  • 5Cho S,Amer-yahia S.Optimizing the secure evaluation of twig queries[A].Proceeding of 28th VLDB Conference[C].Hong Kong:VLDB,2002.490-501.
  • 6Murata M,Tozawa A,Kudo M.XML access control using static analysis[A].In ACM CCS[C].Washington D C:Conference on Computer and Communications Security,2003.73-84.
  • 7Diao Y,Franklin M J.High-performance XML filtering:An overview of Y filter[J].ICDE,2003,26(1):41-48.
  • 8Luo B,Lee D G.Qfilter:Fine-grained run-time XML access ontrol via NFA-based query rewriting[A].CIKM 2004[C].Washington D C:Conference on Information and Knowledge Management,2004.543-552.
  • 9Ferraiolo David F.Proposed NIST standard for role-based access control[J].ACM Transactions on Information and System Security,2001,4(3):224-274.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部