期刊文献+

XML数据模式下基于purpose的隐私访问控制策略研究与实现 被引量:3

RESEARCH AND IMPLEMENTATION OF purpose-BASED PRIVACY ACCESS CONTROL POLICY IN XML DATA MODE
下载PDF
导出
摘要 提出构建基于purpose的对XML数据模式的隐私访问控制策略模型,解决由路径传递引起的查询隐私数据泄漏问题。基于purpose的隐私访问控制策略是一棵最小安全访问树模型。最小安全访问树是一组无冗余路径的以XPath{/,//,[]}片段表示的路径表达式,XPath{/,//,[]}是一组允许访问的隐私结点路径。实验表明最小安全树生成时间取决于隐私结点在一个XML文档中的标注时间和冗余路径的判别时间,而隐私结点的标注时间与隐私数据在XML文档中的分布位置有关。最小安全访问树模型能控制隐私数据的查询泄漏。 In this paper,we propose to construct the purpose-based privacy access control policy model for XML data mode,and to solve the problem of query-leakage of privacy data incurred by path transfer.In our approach,the policy is a minimum secure access tree model.And the minimum secure access tree is a group of path expressions expressed by XPath{/,//,} fragments without redundant paths,while the XPath{/,//,} points to a set of privacy nodes path with access permission.Experimental results show that the generation time of minimum secure tree depends on the labelling time of the private nodes in an XML documents and the discriminating time of redundant paths,and the labelling time is pertinent to the position of privacy data distributed in XML documents.The minimum secure access tree model is able to control the query leakage of private data.
出处 《计算机应用与软件》 CSCD 北大核心 2013年第2期148-151,共4页 Computer Applications and Software
基金 高等学校博士学科点专项科研基金资助课题(200802461146)
关键词 隐私保护 访问控制 安全访问树 Privacy preservation Access control Secure access tree
  • 相关文献

参考文献8

  • 1US Department of Health and Human Services. Summary of HIPAA Privacy Rule[OL].http://www,hhs.gov/ocr/hipaa/,2004. 被引量:1
  • 2Agrawal R,Kiernan J,Srikant R. Xu.Hippocratic Databases[A].VLDB Endowment,2002. 被引量:1
  • 3Gertz M,Jajodia S. Handbook of Database Security:Applications and Trends[M].Springer-Verlag,2007.27-53. 被引量:1
  • 4Damiani E,S De Capitani di Vimercati,Paraboschi S. A Fine-Grained Access Control System for XML Documents[J].ACM Transactions on Information and System Security,2002.169-202. 被引量:1
  • 5Finance B,Medjdoub S,Pucheral P. The case for access control on XML relationships[A].Acm Press,2005. 被引量:1
  • 6Koromilas L,Chinis G,Fundulaki I. Controlling access to XML documents over XML native and relational databases[A].Berlin:springer-verlag,2009. 被引量:1
  • 7Byun J W,Bertino E,Lui N. Purpose-Based Access Control of Complex Data for Privacy Protection[A].Acm Press,2005. 被引量:1
  • 8Afrati F,Chirkova R. Manolis Gergatsoulis etal,On Rewriting XPath Queries Using Views[A].Acm Press,2009. 被引量:1

同被引文献22

  • 1林钧海,秦小林.NHDB关系数据库系统[J].南京航空学院学报,1989,21(3):99-103. 被引量:1
  • 2Cranor L F. Platform for privacy preferences (p3p)[M]//Ency- clopedia of Cryptography and Security. Springer US, 2011..940- 941. 被引量:1
  • 3Ashley P, Hada S, Karjoth G, et al. Enterprise privacy authori- zation language (EPAL 1,2)[Z]. Submission to W3C, 2003. 被引量:1
  • 4Ni Q, Bertino E, Lobo J, et al. Privacy-aware role-based access control[J]. ACM Transactions on Information and System Secu- rity (TISSEC) ,2010,13(3) .,24. 被引量:1
  • 5Ardagna C A, Cremonini M, De Capitani di Vimercati S, et al. A privacy-aware access control system[J]. Journal of Computer Security, 2008,16 (4) : 369-397. 被引量:1
  • 6Ardagna C A,Damiani E,di Vimercati S D C,et al. Towards pri- vacy-enhanced authorization policies and languages[M]//Data and Applications Security XIX. Springer Berlin Heidelberg, 2005.. 16-27. 被引量:1
  • 7Kolter J,Schillinger R, Pernul G. A privacy-enhanced attribute- based access control system[C]//Proc, of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Securi- ty. Edondo Beach, CA, USA, July 2007. 被引量:1
  • 8Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST stan- dard for role-based access control[J]. ACM Transactions on In- formation and System Security (TISSEC), 2001,4(3) : 224-274. 被引量:1
  • 9Ferraiolo D, Cugini J, Kuhn D R. Role-based access control (RBAC) : Features and motivations [C] // Proceedings of llth Annual Computer Security Application Conferenc, 1995.,241-248. 被引量:1
  • 10Anderson A. A comparison of two privacy policy languages:EP- AL and XACML[C]//Proceedings of the 3rd ACM Workshop on Secure Web Service. 2005. 被引量:1

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部