Secure access policy for efficient resource in mobile computing environment

被引:1
|
作者
Jo S.-M. [1 ]
机构
[1] Department of Computer Information Technology Education, Pai Chai University, 155-40 Baejae-ro, Seo-Gu, Daejeon
关键词
Access control; Mobile computing; Policy; Security; XML;
D O I
10.1007/s11416-017-0301-y
中图分类号
学科分类号
摘要
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent. © 2017, Springer-Verlag France SAS.
引用
收藏
页码:297 / 303
页数:6
相关论文
共 50 条
  • [1] A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks
    Meng, Tianhui
    Wolter, Katinka
    Wu, Huaming
    Wang, Qiushi
    PERVASIVE AND MOBILE COMPUTING, 2018, 45 : 4 - 18
  • [2] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [3] Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing
    Wu, Qing
    Li, Liangjun
    Zhang, Leyou
    Mu, Yi
    Rezaeibagha, Fatemeh
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 5533 - 5543
  • [4] Efficient security policy enforcement for the mobile environment
    Atluri, Vijayalakshmi
    Shin, Heechang
    Vaidya, Jaideep
    JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) : 439 - 475
  • [5] Access control based resource allocation in cloud computing environment
    Wang J.
    Liu J.
    Zhang H.
    Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19): : 236 - 243
  • [6] Approaching secure communications in a message-oriented mobile computing environment
    Cui, Z
    Karmouch, A
    Impey, R
    Gray, T
    MULTIMEDIA TOOLS AND APPLICATIONS, 2001, 13 (02) : 147 - 163
  • [7] Approaching Secure Communications in a Message-Oriented Mobile Computing Environment
    Zheng Cui
    Ahmed Karmouch
    Roger Impey
    Tom Gray
    Multimedia Tools and Applications, 2001, 13 : 147 - 163
  • [8] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):
  • [9] Secure access of products in a process environment
    Chou, SC
    Lai, CW
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (02): : 197 - 203
  • [10] Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing
    Tang, Shaohua
    Li, Xiaoyu
    Huang, Xinyi
    Xiang, Yang
    Xu, Lingling
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (07) : 2325 - 2331