期刊文献+

快速有效的XML访问控制新方案 被引量:3

New scheme of XML-based access control for effective querying and quick updating
下载PDF
导出
摘要 随着可扩展标记语言(XML)文档的广泛使用和用户安全意识的加强,XML数据的安全问题显得日益重要。结合索引/标记方案,设计了一种安全的、能有效查询和快速更新的XML访问控制新方案。该方案利用多种授权实现了权限不同的多个用户灵活、安全地查询XML文档数据;利用空对象和备注子节点实现了XML数据的删除和插入。 With the wide use of Extensible Markup Language (XML) documents and the strengthening security awareness, the security issues of XML data become increasingly important. The authors proposed a XML-based access control scheme, which implemented effective querying by combining indexing/labeling scheme. To achieve quick updating, the scheme used NULL objects to delete XML data and memo sub-nodes to insert XML data respectively.
出处 《计算机应用》 CSCD 北大核心 2009年第9期2336-2338,2341,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(60773083) 广东省部产学研项目(2008B090500201)
关键词 可扩展标记语言 访问控制 有效查询 快速更新 索引/标记方案 Extensible Markup Language (XML) access control effective querying quick updating indexing/labeling scheme
  • 相关文献

参考文献8

  • 1DAMIANI E, FANSI M, GABILLON A, et al. A general approach to securely querying XML [ J]. Computer Standards and Interfaces,2008, 30(6) : 379 - 389.
  • 2DUONG M, ZHANG Y. An integrated access control for securely querying and updating XML data [ C]// Proceedings of the 19th Conference on Australasian Database. Darlinghurst, Australia: Australian Computer Society, 2008:75-84.
  • 3李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 4DAMIANI E, De CAPITANI di VIMERCATI S, PARABOSCHI S, et al. A fine-grained access control system for XML documents [ J]. ACM Transactions on Information and System Security, 2002, 5 (2) : 169 -202.
  • 5DUONG M, ZHANG Y. LSDX: A new labeling scheme for dynamically updating XML data [ C]//Proceedings of the 16th Australasian Database Conference. Darlinghurst, Australia: Australian Computer Society, 2005:185 - 193.
  • 6ZHAO G S, CHADWICK D W. On the modeling of Bell-LaPadula security policies Using RBAC [ C]// Proceedings of the 17th IEEE International Workshops on Enabling Technologies. Los Alamitos, CA: IEEE Computer Science, 2008:257-262.
  • 7DAMIANI E, FANSI M, GABILLON A, et al. Securely updating XML [ J]. KES 2007: Proceedings of the 1 lth International Conference on Neural Networks, LNCS 4694. Berlin: Springer-Verlag, 2007:1098 - 1106.
  • 8MASSACCI F, MYLOPOULOS J, ZANNONE N. Hierarchical hippocratic databases with minimal disclosure for virtual organizations [ C]// Proceedings of the 12th ACM Conference on Computer and Communications Security in Computer Security. Heidelberg: Springer, 2005:438-454.

二级参考文献2

共引文献40

同被引文献30

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部