An Access Control Model for Geographic Data in an XML -based Framework

نویسندگان

  • Bat-Odon Purevjii
  • Toshiyuki Amagasa
  • Sayaka Imai
  • Yoshinari Kanamori
چکیده

XML is accepted as a standard format for data exchange on the Web. XML security research has mainly been focused on textual documents since its origin. The previous works are not appropriate in the context of geographic data, which comprises spatial and non-spatial data. Controlling access to those data was a troublesome task because of proprietary and composite data formats of GISs and complex data structures of spatial database systems. Besides allowing flexible integration of geographic data, XML offers us methods to deploy access control for these systems. In this paper we propose an access control model for Web GIS, in which controlled access depends on spatial extents of geographic data, by employing XML, and XML-based 2D vector graphic format SVG. We show its utility in the domain of Internet Mapping into the application of public safety and disaster management for national and local governments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An XML framework for multi-level access control in the enterprise domain

Modeling security information has always been a fundamental part of every security system. A robust and flexible model is needed in order to guarantee both the easy management of security information and the efficient implementation of security mechanisms. In this paper, we present an XMLbased framework, which can be used for controlling access to computer systems. The framework is mainly targe...

متن کامل

Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints

The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are: (a) an Enterprise Access Control Model (b) a Validation mechanism to verify the enterprise access control data developed based on that model, for conformance to the model as well as domain-...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

An XML Security Framework that Integrates NIST RBAC, MAC and DAC Policies

Today’s applications are often constructed by bringing together functionality from multiple systems that utilize varied technologies (e.g., APIs, web services, cloud computing, data mining) and alternative standards (e.g., XML, RDF, OWL, JSON, etc.). Most such applications, constructed as a meta-system (systems of systems), achieve information exchange (IE) via the eXtensible Markup Language (X...

متن کامل

Xml Repository Searcher - Browser Supporting Fine - Grained Access Control

The widespread use of eXtensible Markup Language (XML) for data representation and exchange has led to increasing research interest in methods for XML content searching, presentation, and access control. This paper presents an XML repository searcher-browser application with a declarative role-based access control framework; the proposed access control model allows the definition of a finegrain...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004