期刊文献+

XML文档访问控制研究 被引量:3

Research on Access Control on XML Documents
下载PDF
导出
摘要 针对XML文档访问控制过程中,更新操作引起的重复DTD验证以及DOM树解析、标记问题,提出操作类型的概念。根据操作类型区分不同的更新访问请求,过滤掉不具权限的请求,以节省验证以及标记过程所耗费的内存等系统资源。通过实例证明该方法在更新请求频繁的情况下,性能优于现有的访问控制技术。 To solve the problem focuments of repetitive labeling process and Document Type Definition(DTD) verification process executed by the eXtensible Markup Language(XML) access control system for update operators, action type is defined. Using these action types, user queries are distinguished semantically and unnecessary queries are filtered out at the early stage, so memory and other system resources used in Document Object Model(DOM)-based DTD verification process and labeling process can be saved. The proposed access control technique shows better performance in an environment where update queries occur frequently after compared with existing one.
出处 《计算机工程》 CAS CSCD 北大核心 2009年第17期75-77,共3页 Computer Engineering
基金 陕西省自然科学基金资助项目(2006F50) 航空科学基金资助项目(2006ZC31001)
关键词 XML文档 访问控制 更新操作 eXtensible Markup Language(XML) documents access control update operations
  • 相关文献

参考文献6

  • 1World Wide Web Consortium. eXtensible Markup Language(XML) 1.0[DB/OL]. (2004-02-04). http://ww-w.w3.orgTR/REC-xml/.
  • 2Vimercati S, Marrara S, Samarati E An Access Control Model for Querying XML Data[C]//Proc. of the Workshop on Secure Web Services. Fairfax, VA, USA: [s. n.], 2005: 36-42.
  • 3孙明,路长胜.面向XML文档的客户端混合访问控制模型[J].计算机工程,2007,33(11):144-146. 被引量:4
  • 4唐韶华.XML的授权与访问控制方法[J].小型微型计算机系统,2005,26(3):425-430. 被引量:8
  • 5Damiani E, Vimercati S, Paraboschi S, et al. A Fine Grained Access Control System for XML Documents[J]. ACM Transactions on Information and System Security, 2002, 5(2): 169-202.
  • 6王德强,许峰,茅兵,谢立.XML文档存取控制研究[J].计算机研究与发展,2004,41(3):426-435. 被引量:9

二级参考文献22

  • 1Bray T et al. Extensible markup language (XML). World Wide Web Consortium (W3C)[EB/OL]. http://www.w3c.org/TR/REC-xml.
  • 2"ebXML", http://www.ebxml.org/.
  • 3IOTP: internet open trading protocol[EB/OL]. http://www.ietf.org/html.charters/trade-charter.html.
  • 4Damiani E, De Capitani S. di Vimercati, Paraboschi S, Samarati P. Securing XML documents. in Proc. Of the 2000 International Conference on Extending Database Technology (EDBT 2000), Konstanz, Germany, March 2000,27-31.
  • 5Bertino E, Castano S, Ferrari E, Mesiti M. Specifying and enforcing access control policies for XML document sources[J]. World Wide Web Journal, Baltzer Science Publishers.3, 3.
  • 6Kudo M, Hada S. XML document security based on provisional authorization[C]. Proceedings of the 7th ACM Conference on Computer and Communication Security, November 2000, Athens Greece.
  • 7Bertino E, Castano S, Ferrari E. Securing XML documents with Author-X[J]. IEEE Internet Computing, May. June 2001, 21-31.
  • 8W3C XML Schema[EB/OL]. http://www.w3.org/XML/Schema.
  • 9Clark J et al. XML Path Language (Xpath) Version 1.0, World wide Web consortium (W3C)[EB/OL]. http://www.w3c.org/TR/xpath.
  • 10W3C. Extensible Markup Language (XML) 1.0. http://www.w3.org/TR/REC-xml, 2000-10-06/2002-12-21

共引文献16

同被引文献29

  • 1唐韶华.XML的授权与访问控制方法[J].小型微型计算机系统,2005,26(3):425-430. 被引量:8
  • 2赵强,汪厚祥,李卉.XML访问控制模型研究[J].舰船电子工程,2007,27(3):167-170. 被引量:3
  • 3孙明,路长胜.面向XML文档的客户端混合访问控制模型[J].计算机工程,2007,33(11):144-146. 被引量:4
  • 4BRAY T, PAOLI J, SPERBERG-MCQUEEN C M, et al. Extensible Markup Language (XML) 1.0 (5th ed.). W3C Recommendation 26 November 2008.(http://www. w3.org/TR/2008/REC- xml-20081126/).
  • 5VIMERCATI S, MARRARA S, SAMARATI P. An Access Control Model for Querying XML Data[C]// Proceedings of the Workshop on Secure Web Services. USA: Fairfax, 2005: 36-42.
  • 6LIM C H, SEOG P, SANG H S. Access Control of XML Documents Considering Update Operations[C]// Proceedings of the ACM Workshop on XML Security. USA: Fairfax, 2003: 49-59.
  • 7Document Object Model(DOM), W3C. ( http://www.w3. org/DOM/).
  • 8GABILLON A, BRUNO E. Regulating Access to XMI. Documents[C]//Proceedings of the 15th Annual Working Conference on Database and Application Security. Canada: Ontario, 2001:299-314.
  • 9BERTINO E, CASTANO S, FERRARI E, et al. Specifying and Enforcing Access Control Policies for XML Document Sources[J]. World Wide Web Journal, 2000, 3(3).
  • 10DAMIANI E, VIMERCATI S, PARABOSCHI S, et al. Securing XML Documents[C]//Proceedings of the 2000 International Conference on Extending Database Technology(EDBT2000). Germany: Konstanz, 2000.

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部