Two-stage access control model for XML security

被引:0
|
作者
Sun, W [1 ]
Liu, DX [1 ]
Wang, T [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang Pr, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As large corporations and organizations increasingly exploit the Internet as a means of improving business-transaction efficiency and productivity, it is increasingly common to find operational data and other business information in XML format. Access control for XML database is non-trivial subjects. A number of recent research efforts have considered access control models for XML data([1-5]). Our first contribution is a novel model for specifying XML security access control. Given an XML document accompanied by a document DTD, we allow a two-stage access control policies to pledge to security access XML document at file-level and element-level respectively. On the element-level access control, our approach for these access control policies is based on the novel notion of hide-node views. While the hide-node view DTD is exposed to authorized users, neither the internal XPath annotations nor the full document DTD is visible. Authorized users can only operate data over the hide-node view, making use of the exposed view DTD to access data. Our hide-node view mechanism guarantees that unauthorized user cannot access sensitive data and protects the schema information from access by unauthorized users. We think that the schema information also is sensitive data and should be protected from gain through the data accessing.
引用
收藏
页码:479 / 480
页数:2
相关论文
共 50 条
  • [11] Two-Stage Model Predictive Control for Voltage Collapse Prevention
    Gong, Bo
    Hiskens, Ian A.
    2008 40TH NORTH AMERICAN POWER SYMPOSIUM (NAPS 2008), 2008, : 728 - +
  • [12] Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation
    Xuan, Shichang
    Man, Dapeng
    Wang, Wei
    Zhang, Jiangchuan
    Yang, Wu
    Du, Xiaojiang
    2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017), 2017,
  • [13] The Study of Access Control Model Using XML
    Zhang, Huanming
    Guan, Quanlong
    Luo, Weiqi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 179 - 188
  • [14] An extended mandatory access control model for XML
    Zhang, DZ
    Xue, YS
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2005, PROCEEDINGS: DATA MANAGEMENT ON THE WEB, 2005, 3818 : 280 - 281
  • [15] A formal access control model for XML databases
    Gabillon, A
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 86 - 103
  • [16] Access control model for secure XML documents
    Jo, SM
    Kim, YK
    Kouh, HJ
    Yoo, WH
    Fourth Annual ACIS International Conference on Computer and Information Science, Proceedings, 2005, : 352 - 357
  • [17] Two-stage control for container cranes
    Hong, KS
    Park, BJ
    Lee, MH
    JSME INTERNATIONAL JOURNAL SERIES C-MECHANICAL SYSTEMS MACHINE ELEMENTS AND MANUFACTURING, 2000, 43 (02): : 273 - 282
  • [18] Production control in a two-stage system
    Li, Hui
    Liu, Liming
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2006, 174 (02) : 887 - 904
  • [19] Exploring Information Asymmetry in Two-Stage Security Games
    Xu, Haifeng
    Rabinovich, Zinovi
    Dughmi, Shaddin
    Tambe, Milind
    PROCEEDINGS OF THE TWENTY-NINTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2015, : 1057 - 1063
  • [20] Design of Model Predictive Control to stabilize Two-Stage Inverted Pendulum
    Firmansyah, Rifqi
    Saputra, Pressa P. Surya
    2020 THIRD INTERNATIONAL CONFERENCE ON VOCATIONAL EDUCATION AND ELECTRICAL ENGINEERING (ICVEE): STRENGTHENING THE FRAMEWORK OF SOCIETY 5.0 THROUGH INNOVATIONS IN EDUCATION, ELECTRICAL, ENGINEERING AND INFORMATICS ENGINEERING, 2020,