期刊文献+

XML关系保护模型 被引量:1

Relationships protection model in XML documents
下载PDF
导出
摘要 为了更好的保护节点关系所携带的信息以及XML的敏感信息,提出了利用"块"来组织的访问控制策略,并使用虚节点来指定与关系相关的机密限制。对具有块概念的XML-BB访问控制模型进行了研究,该模型能够隐藏不同块间节点的关系,以一种细粒度访问控制加强了XML敏感信息的保护。实验结果表明了该模型的可行性。 To protect information carried by relationships and sensitive XML information well, the access control policy using the new concept of block is suggested. Virtual nodes are provided to specify confidentiality restriction associated with some relationships. An access control model, called XML-BB (XML block based access control), including this concept of block is presented. The model is used to hide relationships between nodes selected in different blocks and strengthens the protection of XML sensitive information by a fine-grained access control. The implementation of this model is demonstrated to be feasible.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第18期4725-4727,共3页 Computer Engineering and Design
关键词 可扩展标记语言 访问控制 关系保护 虚节点 授权视图 XML access control relationships protection block virtual node authorized view
  • 相关文献

参考文献10

  • 1Bertino E,Castano S,Ferrari E,et al.Specifying and enforcing access control policies for XML document sources[J].World Wide Web Journal,2000,3(3): 139-151.
  • 2Damiani E,De Capitanidi Vimercati,Paraboschi S,et al.Securing XML documents [C]. International Conference on Extending Database Technology.Berlin: Springer,2000:121 - 135.
  • 3Damiani E,De Capitanidi Vimercati,Paraboschi S,et al.A finegrained access control system for XML documents [C]. ACM Transactions on Information and System Security. New York: ACM Press,2002:169-202.
  • 4Gabillon A,Bruno E.Regulating access to XML documents[C]. Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security.Norwell:Kluwer Academic Publishers,2001:299- 314.
  • 5Gabillon A. An authorization model for XML databases [C]. ACM Workshop on Secure Web Services.New York:ACM Press, 2004:16-28.
  • 6Kudo M,Hada S.XML document security based on provisional authorisation [C]. ACM Computer and Communications Security.New York:ACM Press,2000:87-96.
  • 7Finance B,Medjdoub S,Pucheral P.The case for access control on xml relationships[C].Proceedings of the ACM CIKM International Conference on Information and Knowledge Management. New York:ACM Press,2005:107-114.
  • 8Brewer D,Nash M.The Chinese wall security policy[C].IEEE Symposium on Security and Privacy. Computer Society Press, 1989:206-214.
  • 9Clark J,DeRose S.XML path language (XPath) version 1.0[EB/ OL]. http://www.w3c.org/TR/xpath.
  • 10Cuppens F, Cuppens-Boulahia N,Sans T.Protection of relationships in XML documents with the XML-BB model[C].Lecture Notes in Computer Science,2005:148-163.

同被引文献5

引证文献1

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部