Access Control Method with XML Databases

نویسندگان

  • Lili Sun
  • Yan Li
چکیده

The extensible markup language (XML) is a standard for describing the structure of information and content on the Internet over the past several years. XML has recently emerged as the most relevant standardization in the area of document representation through markup language (Bertion, 2002). XML is used to store and exchange data in the Internet environment that may include private messages of customers. It overcomes the complexity of Standard Generalized Markup Language (SGML) and the user can define document structures, removing the limit of the fixed ABSTRACT

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Access Control Method Based on the Prefix Labeling Scheme for XML Repositories

This paper describes an access control method of the XML repository system, SAXOPHONE, which was implemented at Tokyo Metropolitan University. The main feature of our research is a novel account identifier that is based on the prefix-labeling scheme to realize a hierarchical authorization. SAXOPHONE uses relational databases for XML document storage. Using it, any valid or well-formed XML docum...

متن کامل

Performance Evaluation of Trust Based Access Control for XML Databases

In order to improve security and provide dynamic access control for XML databases, we developed trust based access control for XML databases. Trust based access control for XML databases manages the access policy depending on users’ trustworthiness and prevents unauthorized processes, malicious transactions and misuse from both outsiders and insiders. Trust scores are updated on the basis of us...

متن کامل

Using Usage Control to Access XML Databases

XML documents usually contain private information that cannot be shared by every user communities. It is widely used in web environment. XML database is becoming increasingly important since it consists of XML documents. Several applications for supporting selective access to data are available over the web. Usage control has been considered as the next generation access control model with dist...

متن کامل

Pragmatic XML Access Control Using Off-the-Shelf RDBMS

As the XML model gets more popular, new needs arise to specify access control within XML model. To meet these needs, various XML access control models and enforcement methods have been proposed recently. However, by and large, these approaches either assume the support of security features from XML databases or use proprietary tools outside of databases. Since there are currently few commercial...

متن کامل

A practical mandatory access control model for XML databases

A practical mandatory access control (MAC) model for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of different applications. In order to preserve the integrity of data in XML databases, a constraint between a read-access rule and a write-access rule in label access policy is introduced. Rules for label assignment a...

متن کامل

A Performance Evaluation of Logging in XML Databases Using an Xlog File for Trust Based Access Control

Logging is an important process in databases and is used for recovery and security purposes. Logging in XML databases has rarely been discussed in the literature. In this paper the Xlog file is presented as a dynamic and temporary log file for XML databases. It is used, not for recovery, but to calculate user trust values by recording users’ bad transactions and errors. The novelty in this appr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016