A role-based access control model for XML repositories

被引:6
|
作者
He, H [1 ]
Wong, RK [1 ]
机构
[1] Univ Sydney, Basser Dept Comp Sci, Sydney, NSW 2006, Australia
关键词
D O I
10.1109/WISE.2000.882385
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XML has recently attracted many software vendors, business organizations and research institutions over the world as a promising way to represent Web information. The availability of large amounts of XML data on the Web raises several issues that the XML standard does not address. In particular, access control and authorization issues have seldom been addressed. Since XML are usually stored in multiple sources or repositories, discretionary access control is desirable, if it is not necessary. In this paper, we propose a role-based access control (RBAC) model for XML repositories. The resultant RBAC scheme is in XML and heavily relies on XPath.
引用
收藏
页码:138 / 145
页数:2
相关论文
共 50 条
  • [21] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [22] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [23] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [24] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [25] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [26] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    2003, Huazhong University of Science and Technology (31):
  • [27] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [28] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [29] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [30] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44