期刊文献+

细粒度的XML推理控制及实现 被引量:1

Fine-grained XML inference control and its implementation
下载PDF
导出
摘要 提出了一种细粒度的XML推理控制模型及实现机制,解决了强制访问控制所不能解决的敏感信息推理问题;改进了算法,可快速获得解决敏感信息泄露的最佳方案;引入剪枝策略,实现了安全信息最大化发布。 A fine-grained inference control model was proposed and its implementation mechanism of XML document was given. It could solve the problem of sensitive information inference that couldn't be solved by MAC (Mandatory Access Control). The algorithm was improved to obtain the best solution to sensitive information leakage quickly. The pruning methods were adopted to publish the secure information as much as possible.
出处 《计算机应用》 CSCD 北大核心 2005年第11期2544-2546,2553,共4页 journal of Computer Applications
基金 湖北省科技攻关项目(2002AA103A06)
关键词 XML文档 细粒度 推理控制 强制访问控制 XML document fine-grain inference control MAC( Mandatory Access Control)
  • 相关文献

参考文献4

二级参考文献17

  • 1Abiteboul S, Hull R, Vianu V. Foundations of Databases. Boston, MA: Addison-Wesley, 1995. 被引量:1
  • 2Ramakrishnan R, Gehrke J. Database Management Systems. NY: McGraw-Hill Higher Education, 2000. 被引量:1
  • 3Hara CS, Davidson SB. Reasoning about nested functional dependencies. In: Proceedings of the ACM Symposium on Principles of Database Systems (PODS). Philadelphia: ACM Pess, 1999. 91~100. 被引量:1
  • 4Buneman P, Fan WF, Weinstein S. Path constraints on semistructured and structured data. In: Proceedings of the ACM Symposium on Principles of Database Systems (PODS). Seattle: ACM Press, 1998. 129~138. 被引量:1
  • 5Abiteboul S, Vianu V. Regular path queries with constraints. In: Proceedings of the ACM Symposium on Principles of Database Systems (PODS). Tucson: ACM Press, 1997. 122~133. 被引量:1
  • 6Buneman P, Fan WF, Weinstein S. Path constraints in semistructured databases. Journal of Computer and System Sciences, 2000,61(2):146~193. 被引量:1
  • 7Extensible Markup Language (XML) 1.0 (Second Edition). W3C Recommendation, 2000. http://www.w3.org/TR/REC-xml. 被引量:1
  • 8XML-Data. W3C Note, 1998. http://www.w3.org/TR/1998/NOTE-XML-data/. 被引量:1
  • 9XML schema part 1: Structures. W3C Recommendation, 2001. http://www.w3.org/TR/xmlschema-1/. 被引量:1
  • 10XML path language (XPath). W3C Recommendation, 1999. http://www.w3.org/TR/xpath. 被引量:1

共引文献61

同被引文献7

  • 1李斓,何永忠,冯登国.面向XML文档的细粒度强制访问控制模型[J].软件学报,2004,15(10):1528-1537. 被引量:41
  • 2李国敬,李金双,周福才.XML安全风险分析[J].沈阳工程学院学报(自然科学版),2005,1(2):92-94. 被引量:2
  • 3W3C. Extensible markup language (XML) 1.0 [OL] .http://www. w3.org/TR/2004/REC-xml-20040204,2004-02-04. 被引量:1
  • 4XML encryption syntax and processing [EB/OL]. http://www. w3c.org/TR/xmlenc-core/,2002. 被引量:1
  • 5XML signature syntax and processing[EB/OL], http://www.w3c. org/TR/2001/PR-xmldsig-eore-20010820,2001-08-20. 被引量:1
  • 6Stoica A,Farka S C.Ontology guided XML security engine[J]. Journal of Intelligent Information Systems,2004,23(3):209-223. 被引量:1
  • 7张尚昂 张来顺.基于XSLT的XML安全视图的研究.计算机研究新进展,2007,8:141-145. 被引量:1

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部