A role-based access control model for XML repositories

被引:6
|
作者
He, H [1 ]
Wong, RK [1 ]
机构
[1] Univ Sydney, Basser Dept Comp Sci, Sydney, NSW 2006, Australia
关键词
D O I
10.1109/WISE.2000.882385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XML has recently attracted many software vendors, business organizations and research institutions over the world as a promising way to represent Web information. The availability of large amounts of XML data on the Web raises several issues that the XML standard does not address. In particular, access control and authorization issues have seldom been addressed. Since XML are usually stored in multiple sources or repositories, discretionary access control is desirable, if it is not necessary. In this paper, we propose a role-based access control (RBAC) model for XML repositories. The resultant RBAC scheme is in XML and heavily relies on XPath.
引用
收藏
页码:138 / 145
页数:2
相关论文
共 50 条
  • [41] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [42] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [43] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [44] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [45] Consistency maintenance for constraint in role-based access control model
    韩伟力
    陈刚
    董金祥
    尹建伟
    Journal of Zhejiang University Science, 2002, (03) : 43 - 48
  • [46] A Purpose-Involved Role-Based Access Control Model
    Wang, Yingjie
    Zhou, Zhihong
    Li, Jianhua
    FOUNDATIONS OF INTELLIGENT SYSTEMS (ISKE 2013), 2014, 277 : 1119 - 1131
  • [47] A privacy enhanced role-based access control model for enterprises
    Yang, CG
    Zhang, CN
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1012 - 1021
  • [48] An Extended Role-Based Access Control Model for Delegating Obligations
    Ben-Ghorbel-Talbi, Meriam
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Bouhoula, Adel
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +
  • [49] Consistency maintenance for constraint in role-based access control model
    Wei-li Han
    Gang Chen
    Jian-wei Yin
    Jin-xiang Dong
    Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
  • [50] Towards Trustworthy Delegation in Role-Based Access Control Model
    Toahchoodee, Manachai
    Xie, Xing
    Ray, Indrakshi
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 379 - 394