Evaluation of Practical Trust Based Access Control for XML Databases

被引:0
作者
Farooqi, Norah [1 ]
North, Siobhan [1 ]
机构
[1] Univ Sheffield, Dept Comp Sci, Sheffield S10 2TN, S Yorkshire, England
来源
2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS | 2012年
关键词
XML databases; security; trust based access control; evaluation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In order to improve security and provide dynamic access control for XML databases, we developed trust based access control for XML databases. Trust based access control for XML databases manages the access policy depending on users' trustworthiness and prevents unauthorized processes, malicious transactions and misuse from both outsiders and insiders. Trust scores are updated on the basis of users' histories. Privileges are automatically modified and adjusted over time depending on user behavior. In this paper, a practical trust based access control module for XML databases is evaluated. The dynamic access control has been tested from security, scalability, and performance perspectives. The experimental results illustrate the flexibility of trust values and the scalability of the system with small to large XML databases and with various numbers of users.
引用
收藏
页码:336 / 340
页数:5
相关论文
共 17 条
  • [1] Developing a model for trust management in pervasive devices
    Almenárez, F
    Marín, A
    Díaz, D
    Sanchéz, J
    [J]. FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 267 - +
  • [2] Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases
    Chagarlamudi, Manideep
    Panda, Brajendra
    Hu, Yi
    [J]. PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1616 - +
  • [3] Farooqi N., 2011, 2011 6th International Conference for Internet Technology and Secured Transactions (ICITST), P764
  • [4] Farooqi N., 2011, CS1109 U SHEFF DEP C
  • [5] Farooqi N., 2012, WORLD C INT SEC C WO
  • [6] Han-fa X., 2010, 2 IITA INT C GEOSC R, P552
  • [7] Hitchens M., 2001, LECT NOTE COMPUTER S, V2229, P131
  • [8] Lili Sun, 2010, Proceedings of the 2010 Fourth International Conference on Network and System Security (NSS 2010), P486, DOI 10.1109/NSS.2010.28
  • [9] Lin AZ, 2006, GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, P557
  • [10] A trust-based access control with feedback
    Ma, Xiaoning
    Feng, Zhiyong
    Xu, Chao
    Wang, Jiafang
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 510 - 514