Two-stage access control model for XML security

被引:0
|
作者
Sun, W [1 ]
Liu, DX [1 ]
Wang, T [1 ]
机构
[1] Harbin Engn Univ, Coll Comp Sci & Technol, Harbin, Heilongjiang Pr, Peoples R China
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As large corporations and organizations increasingly exploit the Internet as a means of improving business-transaction efficiency and productivity, it is increasingly common to find operational data and other business information in XML format. Access control for XML database is non-trivial subjects. A number of recent research efforts have considered access control models for XML data([1-5]). Our first contribution is a novel model for specifying XML security access control. Given an XML document accompanied by a document DTD, we allow a two-stage access control policies to pledge to security access XML document at file-level and element-level respectively. On the element-level access control, our approach for these access control policies is based on the novel notion of hide-node views. While the hide-node view DTD is exposed to authorized users, neither the internal XPath annotations nor the full document DTD is visible. Authorized users can only operate data over the hide-node view, making use of the exposed view DTD to access data. Our hide-node view mechanism guarantees that unauthorized user cannot access sensitive data and protects the schema information from access by unauthorized users. We think that the schema information also is sensitive data and should be protected from gain through the data accessing.
引用
收藏
页码:479 / 480
页数:2
相关论文
共 50 条
  • [41] Two-stage pyrolysis model of PVC
    Wu, Chao-Hsiung, 1600, Canadian Soc for Chemical Engineering, Ottawa, Canada (72):
  • [42] A two-stage model of fracture of rocks
    Kuksenko, V
    Tomilin, N
    Damaskinskaya, E
    Lockner, D
    PURE AND APPLIED GEOPHYSICS, 1996, 146 (02) : 253 - 263
  • [43] A two-stage model for Cepaea polymorphism
    Cook, LM
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 1998, 353 (1375) : 1577 - 1593
  • [44] A rule-based XML access control model
    Anutariya, C
    Chatvichienchai, S
    Iwiahara, M
    Wuwongse, V
    Kambayashi, Y
    RULES AND RULE MARKUP LANGUAGES FOR THE SEMANTIC WEB, 2003, 2876 : 35 - 48
  • [45] An Access Control Model for Supporting XML Document Updating
    Mirabi, Meghdad
    Ibrahim, Hamidah
    Fathi, Leila
    Udzir, Nur Izura
    Mamat, Ali
    NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 37 - 46
  • [46] Hippocratic XML databases: a model and an access control mechanism
    Lee, Jae-Gil
    Whang, Kyu-Young
    Han, Wook-Shin
    Song, Il-Yeol
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2006, 21 (06): : 395 - 404
  • [47] Extensible access control model for XML document collections
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 373 - 380
  • [48] A practical mandatory access control model for XML databases
    Zh, Hong
    Lue, Kevin
    Jin, Renchao
    INFORMATION SCIENCES, 2009, 179 (08) : 1116 - 1133
  • [49] A model and its solution for the control of the stock price by the banker with two-stage decision
    Yang Naiding
    Wang Liang
    Yan Pengyu
    Zheng Zheng
    GLOBALIZATION CHALLENGE AND MANAGEMENT TRANSFORMATION, VOLS I - III, 2007, : 690 - 696
  • [50] Pervasive hybrid two-stage fusion model of intelligent wireless network security threat perception
    Hang F.
    Xie L.
    Guo W.
    Lv Y.
    Ou W.
    Shanthini A.
    International Journal of High Performance Systems Architecture, 2021, 10 (3-4) : 128 - 139