期刊文献+

多级安全XML文档删除操作安全策略研究 被引量:1

Security policy for REMOVE operation of multilevel XML document
下载PDF
导出
摘要 XML应用的不断扩展带来了XML安全的需求。目前关于XML安全性的研究主要集中于自主访问控制、基于角色的访问控制和视图技术,而对于强制访问控制很少有研究。对多级安全XML文档的元素删除操作进行了研究。由于在结构完整性约束和实体完整性约束下,低安全等级用户的元素删除操作可能导致高安全等级数据失去可用性或者产生信息隐通道,为此提出了一个滞后删除策略,并描述了该策略的完整性性质及实现。 XML's increasing popularity highlights the security discretional access control,role-based access control and view need for XML documents.Researchers have paid more attention on based technology,rather than mandatory access control.This paper focuses on the REMOVE operation of multilevel XML under the constraint of the hierarchy and the integrity.A novel policy "delayed-removing" is proposed which can avoid convert channel and keep the availability and the secrecy of higher level data element while removing the lower level data element.The integrity constraint and the implement of the policy are also detailed.
出处 《计算机工程与应用》 CSCD 北大核心 2008年第22期166-168,191,共4页 Computer Engineering and Applications
关键词 XML 多级安全 完整性 可用性 隐通道 XML multilevel security integrity availability covert channel
  • 相关文献

参考文献5

  • 1Damiani E,Vimercati S D C,Paraboschi S,et al.A fine-grained access control system for XML documents[C]//ACM Transactions on Information and System Security(TISSEC),2002,5 : 169-202.
  • 2李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 3LaPadula L J,Bell D E.Secure computer systems:a mathematical model, 2547 (Volume II) [R].The MITRE Corporation, Bedford, Massachussetts, 1973.
  • 4Bell D E,LaPadula L J.Secure computer systems:mathematical foundations and model,M74-244[R].The MITRE Corporation,Bedford, Massachussetts, 1973.
  • 5Buneman P,Davidson S,Fan W,et al.Reasoning about keys for XML[C]//Revised Papers from the 8th International Workshop on Database Programming Languages, 2001 : 133-148.

二级参考文献2

共引文献40

同被引文献10

  • 1GB/T22239-2008.信息系统安全等级保护基本要求[S].2008.
  • 2Sander O,Ian B.A proposal for an xml confidentiality label and related binding of metadata to data objects[R] .RTO-MPIST-091-22.NATO C3Agency,2010.
  • 3World Wide Web Consortium(W3C.“extensible markup language(XML)1.0(Second Edition)”[EB/OL] .[2013-08-19] .http://www.w3c.org/TR/REC-xml.
  • 4Barbulescu M,Grigoriu R O,Halcu I,et al.Integrating of structured,semi-structured and unstructured data in natural and build environmental engineering[C] //11th Roedunet International Conference(RoEduNet).IEEE,2013:1-4.
  • 5LEE T Y.Formalisms on semi-structured and unstructured data schema computations[D] .Hong Kong:University of Hong Kong,2010.
  • 6Chen W B,Zhang C,Gao S.Segmentation tree based multiple object image retrieval[C] //IEEE International Symposium on Multimedia.IEEE,2012:214-221.
  • 7Chergui A,Bekkhoucha A,Sabbar W.Video scene segmentation using the shot transition detection by local characterization of the points of interest[C] //6th International Conference on Sciences of Electronics,Technologies of Information and Telecommunications.IEEE,2012:404-411.
  • 8Bell D E,Lapadula L J.Seccure computer system:Unified exposition and multics interpretation[R] .The MITRE Corporation,TechRep:MTR-2997Revision 1,1976.
  • 9陈君,王庆.基于图割和显著性的图像结构表示方法研究[J].计算机应用研究,2009,26(9):3589-3592. 被引量:2
  • 10曹利峰,李中,陈性元,冯瑜.基于XML的数据客体与安全标记绑定方法[J].计算机科学,2013,40(8):124-128. 被引量:3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部