Two-stage access control model for XML security

被引:0
|
作者
Sun, W [1 ]
Liu, DX [1 ]
Wang, T [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang Pr, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As large corporations and organizations increasingly exploit the Internet as a means of improving business-transaction efficiency and productivity, it is increasingly common to find operational data and other business information in XML format. Access control for XML database is non-trivial subjects. A number of recent research efforts have considered access control models for XML data([1-5]). Our first contribution is a novel model for specifying XML security access control. Given an XML document accompanied by a document DTD, we allow a two-stage access control policies to pledge to security access XML document at file-level and element-level respectively. On the element-level access control, our approach for these access control policies is based on the novel notion of hide-node views. While the hide-node view DTD is exposed to authorized users, neither the internal XPath annotations nor the full document DTD is visible. Authorized users can only operate data over the hide-node view, making use of the exposed view DTD to access data. Our hide-node view mechanism guarantees that unauthorized user cannot access sensitive data and protects the schema information from access by unauthorized users. We think that the schema information also is sensitive data and should be protected from gain through the data accessing.
引用
收藏
页码:479 / 480
页数:2
相关论文
共 50 条
  • [1] A model of XML access control with dual-level security views
    Sun, W
    Liu, DX
    Wang, T
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 799 - 802
  • [2] XML access control for security and memory management
    Jo, SM
    Yang, CM
    Yoo, WH
    Intelligence in Communication Systems, 2005, 190 : 179 - 189
  • [3] Two-stage security controls selection
    Yevseyeva, Iryna
    Fernandes, Vitor Basto
    van Moorsel, Aad
    Janicke, Helge
    Emmerich, Michael
    INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 : 971 - 978
  • [4] An Access Control Model for XML Repositories
    Zhong, Hao
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 2360 - 2366
  • [5] Two-stage fly control
    不详
    IRISH VETERINARY JOURNAL, 1997, 50 (08) : 467 - 467
  • [6] Two phase filtering for XML access control
    Lyun, Changwoo
    Park, Seog
    SECURE DATA MANAGEMENT, 2006, 4165 : 115 - 130
  • [7] Stability Conditions for Constrained Two-Stage Internal Model Control
    Adegbege, Ambrose A.
    Heath, William P.
    49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 5251 - 5256
  • [8] QoS control schemes for two-stage Ethernet passive optical access networks
    Shami, A
    Bai, XF
    Ghani, N
    Assi, CM
    Mouftah, HT
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (08) : 1467 - 1478
  • [9] A Two-stage Model Predictive Control for Modular Multilevel Converters
    Ma W.
    Sun P.
    Zhou G.
    Sailijiang G.
    Zhang Z.
    Liu Y.
    Wang Y.
    Dianwang Jishu/Power System Technology, 2020, 44 (04): : 1419 - 1427
  • [10] Quality control with two-stage pricing model in medical logistics
    Wu, DJ
    Zhao, LD
    Han, RZ
    Fourth Wuhan International Conference on E-Business: The Internet Era & The Global Enterprise, Vols 1 and 2, 2005, : 1554 - 1559