期刊文献+

一个改进的细粒度XML文档强制访问控制模型

Improved Fine-grained Mandatory Access Control Model for XML Document
下载PDF
导出
摘要 XML应用的不断扩展带来了XML安全的需求.目前关于XML安全性的研究主要集中于自主访问控制、基于角色的访问控制和视图技术,而对于强制访问控制的研究较少.提出一个改进的XML文档的强制访问控制模型.模型建立了XML文档的多级安全完整性性质.为避免结构约束与完整性约束可能产生隐通道,模型提出"滞后删除"策略.对XQuery和XUpdate的主要操作进行语义描述,并对模型的安全性进行分析. XML's increasing popularity highlights the security need for XML documents. Researchers have paid more attention on discretional access control, role-based access control and view based technology, rather than mandatory access control. A improved mandatory access control model for XML is presented in the paper. The integr!ty properties for multilevel XML document are proposed in the paper. A novel approach "delayed-removing" is introduced in order to avoid covert channel. In the paper, the manipulation rules for typical operation of XQuery and XUpdate are created, and the security of the model is discussed.
出处 《小型微型计算机系统》 CSCD 北大核心 2009年第6期1043-1048,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60703048)资助
关键词 XML 多级安全 多级完整性 隐通道 XML multilevel security multilevel integrity covert channel
  • 相关文献

参考文献14

  • 1Damiani E, Vimercati SDC, Paraboschi S, et al. A fine-grained access control system for XML documents[C]. ACM Transactions on Information and System Security (TISSEC). May 2002,5:169-202.
  • 2Bertino E,Castano S,Ferrari E,et al. Controlled access and dissemination of XML documents[C]. Workshop on Web Information and Data Management. 1999,22-27.
  • 3Bertino E, Castano S, Ferrari E, Mesiti M. Specifying and enforcing access control policies for XML document sources[J]. World Wide Web Journal, 2000, 3(3):139-151.
  • 4李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 5Chandramouli R. Application of XML tools for enterprise-wide RBAC implementation tasks[C]. Proc. of the 5th ACM Workshop on Role-Based Access Control. 2000, 11-18.
  • 6Wang J, Sylvia L. Osborn. A role-based approach to access control for XML databases[C]. Proceedings 9th ACM Symposium on Access Control Models and Technologies. 2004, 70-77.
  • 7Zhang X W, Park J, Sandhu R. Schema based XML security: RBAC approach[R]. Technical Report; IFIP WG 11.3, 2003.
  • 8Barkley J, Kuhn R, Rosenthal L, et al. Role-based access control for the web[C]. CALS Expo International & 21st Century Commerce 1998: Global Business Solutions for the New Millennium (1998).
  • 9Fan W, Chan C, Garofalakis M. Secure XML querying with security views[C]. Sigmod Conference 2004, 2004,587-598.
  • 10Kuper G, Massacci F, Rassadko N. Generalized XML security views [C]. 10th ACM Symposium on Access Control Models and Technologies. 2005, 77-84.

二级参考文献2

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部