Secure access policy for efficient resource in mobile computing environment

被引:1
作者
Jo S.-M. [1 ]
机构
[1] Department of Computer Information Technology Education, Pai Chai University, 155-40 Baejae-ro, Seo-Gu, Daejeon
关键词
Access control; Mobile computing; Policy; Security; XML;
D O I
10.1007/s11416-017-0301-y
中图分类号
学科分类号
摘要
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent. © 2017, Springer-Verlag France SAS.
引用
收藏
页码:297 / 303
页数:6
相关论文
共 23 条
[1]  
Kim J.C., Chung K.Y., Depression index service using knowledge based crowdsourcing in smart health, Wirel. Pers. Commun, 93, 1, pp. 255-268, (2017)
[2]  
Charles P.P., Shari L.P., Security in Computing, (2003)
[3]  
Bishop M., Computer Security, (2003)
[4]  
Bartel M., Boyer J., Fox B., XML Signature syntax and processing, (2002)
[5]  
Deutsch A., Fernandez M., Florescu D., Levy A., Suciu D., A query language for XML, (1999)
[6]  
Mohan S., Sengupta A., Wu Y., A Framework for access control for XML. ACM Journal, vol. v, No. pp.1–38, July, (2006)
[7]  
Kudo M., Hada S., XML Document Security based on provisional authorization, ACM Conference on Computer and Communications Security, Athens, (2000)
[8]  
Hada S., Kudo M., XML access control language: provisional authorization for XML Documents, (2002)
[9]  
Guard C., EXtenible Rights Markup Language (XrML) 2.0, (2001)
[10]  
Gabillon A., Bruno E., Regulating access to XML documents, Proceedings of the Fifteenth Annual IFIP WG 11.3 Working Conference on Database Security, Niagara on the Lake, Ontario, July, (2001)