首页> 外文期刊>International journal of computer science and network security >An Approach of Query Request Authorization Process for the Access Control System to XML Documents
【24h】

An Approach of Query Request Authorization Process for the Access Control System to XML Documents

机译:XML文档访问控制系统查询请求授权过程的一种方法

获取原文
获取原文并翻译 | 示例
           

摘要

Access control is one of the fundamental security mechanisms in information systems. When a multi-user system uses XML documents as data storage, the need of access control to XML documents arises. Due to the hierarchical structure, XML access control is finegrained in nature. For this criterion, instead of controlling access to the whole XML document, it is possible to limit user access to substructures of the document. One of the key problems on which XML access control is centered is to find techniques for efficient enforcement of access control policy over XML data, thus user access authorization. In general, XML access control model uses XPath expressions for specifying the substructure of the document to define policy. Authorization process needs to find the substructure which is referring from the policy in order to evaluate user access to requested data. Thus, authorization process needs to access the data file every time user requests access to data. Evaluating concurrent requests on large data slow down the data access process especially on the Internet where large number of user accesses at any given time is very common. In this paper, we use classification of user requests and the user policy, and compare them to get the authorization result. Our experiment shows that the process significantly minimizes the need of data access in the process of evaluating user access.
机译:访问控制是信息系统中基本的安全机制之一。当多用户系统使用XML文档作为数据存储时,就需要对XML文档进行访问控制。由于具有分层结构,因此XML访问控制实际上是细粒度的。对于此标准,可以限制用户对文档子结构的访问,而不是控制对整个XML文档的访问。 XML访问控制所关注的关键问题之一是找到有效执行XML数据访问控制策略(从而实现用户访问授权)的技术。通常,XML访问控制模型使用XPath表达式来指定文档的子结构以定义策略。授权过程需要找到该策略引用的子结构,以便评估用户对所请求数据的访问。因此,每次用户请求访问数据时,授权过程都需要访问数据文件。评估大数据上的并发请求会减慢数据访问过程,尤其是在Internet上,在任何给定时间都有大量用户访问非常普遍。在本文中,我们使用用户请求的分类和用户策略,并将它们进行比较以获得授权结果。我们的实验表明,在评估用户访问权限的过程中,该过程极大地减少了对数据访问的需求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号