Data Hiding and Security for XMLDatabase: A TRBAC-Based Approach

被引:1
|
作者
ZHANG Wan-song
机构
关键词
XML data; access control; data security;
D O I
暂无
中图分类号
TP311.13 [];
学科分类号
1201 ;
摘要
In order to cope with varying protection granularity levels of XML (eXtensible Markup Language) documents, we propose a TXAC (Two-level XML Access Control) framework, in which an extended TRBAC (Temporal Role-Based Access Control) approach is proposed to deal with the dynamic XML data. With different system components, TXAC algorithm evaluates access requests efficiently by appropriate access control policy in dynamic web environment. The method is a flexible and powerful security system offering a multi-level access control solution.
引用
收藏
页码:293 / 296
页数:4
相关论文
共 50 条
  • [1] Binary nonogram puzzle based data hiding technique for data security
    Kamil, Samar
    Abdullah, Siti Norul Huda Sheikh
    Hasan, Mohammad Kamrul
    Alomari, Yazan M.
    Alyasseri, Zaid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 4951 - 4992
  • [2] Binary nonogram puzzle based data hiding technique for data security
    Samar Kamil
    Siti Norul Huda Sheikh Abdullah
    Mohammad Kamrul Hasan
    Yazan M. Alomari
    Zaid Alyasseri
    Multimedia Tools and Applications, 2024, 83 : 4951 - 4992
  • [3] A hybrid hiding encryption algorithm (HHEA) for data communication security
    Shaar, M
    Saeb, M
    Badawi, U
    Elmessiery, M
    PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 476 - 478
  • [4] On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding
    Phadikar, Amit
    Maity, Santi P.
    INFORMATION SECURITY JOURNAL, 2011, 20 (06): : 274 - 289
  • [5] Towards a New Security Approach Based on Heartbeat Authentication to Ensure Security of Cloud Data Access
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 37 - 43
  • [6] An approach for Big Data Security based on Hadoop Distributed File system
    Mahmoud, Hadeer
    Hegazy, Abdelfatah
    Khafagy, Mohamed H.
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON INNOVATIVE TRENDS IN COMPUTER ENGINEERING (ITCE' 2018), 2018, : 109 - 114
  • [7] A neural network approach to digital data hiding based on the perceptual masking model of the human vision system
    Najafi, Hossein L.
    INTERNATIONAL JOURNAL OF INTELLIGENT COMPUTING AND CYBERNETICS, 2010, 3 (03) : 391 - 409
  • [8] An Approach to Security for Unstructured Big Data
    Md. Ezazul Islam
    Md. Rafiqul Islam
    A B M Shawkat Ali
    The Review of Socionetwork Strategies, 2016, 10 (2) : 105 - 123
  • [9] Pixel Block-based Data Hiding Approach for Enhanced Payload Capacity in Spatial Domain Images
    Nevin, Muhammad
    Putra, Gregorius Guntur Sunardi
    De La Croix, Ntivuguruzwa Jean
    Ahmad, Tohari
    2023 IEEE 2ND INDUSTRIAL ELECTRONICS SOCIETY ANNUAL ON-LINE CONFERENCE, ONCON, 2023,
  • [10] Holistic Data Security: A Balanced Approach to Data and Privacy
    Lu, Yao
    INFORMACIOS TARSADALOM, 2023, 23 (04): : 102 - 105