Secure access policy for efficient resource in mobile computing environment

被引:1
|
作者
Jo S.-M. [1 ]
机构
[1] Department of Computer Information Technology Education, Pai Chai University, 155-40 Baejae-ro, Seo-Gu, Daejeon
关键词
Access control; Mobile computing; Policy; Security; XML;
D O I
10.1007/s11416-017-0301-y
中图分类号
学科分类号
摘要
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent. © 2017, Springer-Verlag France SAS.
引用
收藏
页码:297 / 303
页数:6
相关论文
共 50 条
  • [21] User authentication in mobile computing environment
    Takubo, A
    Ishikawa, M
    Watanabe, T
    Soga, M
    Mizuno, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1997, E80A (07) : 1288 - 1298
  • [22] Computation offloading and resource allocation for mobile edge computing with multiple access points
    Li, Qiuping
    Zhao, Junhui
    Gong, Yi
    IET COMMUNICATIONS, 2019, 13 (17) : 2668 - 2677
  • [23] The role of deontic concepts and commitment in the policy specification of mobile computing environment
    Gong, XF
    Newman, J
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 807 - 815
  • [24] A Formal Policy Oriented Access Control Model for Secure Enterprise Network Environment
    Singh, Manpreet
    Patterh, Manjeet Singh
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (02): : 1 - 14
  • [25] FLEXIBLE AND SECURE ACCESS TO COMPUTING CLUSTERS
    Meizner, Jan
    Malawski, Maciej
    Bubak, Marian
    COMPUTER SCIENCE-AGH, 2010, 11 : 21 - 36
  • [26] A Secure Framework for Mobile Cloud Computing
    Al-Omary, Alauddin
    2019 INTERNATIONAL CONFERENCE ON INNOVATION AND INTELLIGENCE FOR INFORMATICS, COMPUTING, AND TECHNOLOGIES (3ICT), 2019,
  • [27] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [28] Adaptive computation offloading and resource allocation strategy in a mobile edge computing environment
    Tong, Zhao
    Deng, Xiaomei
    Ye, Feng
    Basodi, Sunitha
    Xiao, Xueli
    Pan, Yi
    INFORMATION SCIENCES, 2020, 537 (537) : 116 - 131
  • [29] Efficient object-oriented query optimisation in mobile computing environment
    Zhou, XD
    Zaslavsky, A
    Rasheed, A
    Price, R
    AUSTRALIAN COMPUTER JOURNAL, 1998, 30 (02): : 65 - 75
  • [30] A Secure and Efficient Access Control Mechanism for Network Slice Resources in Distributed Environment
    Zhang, Guoyi
    Zhu, Hailong
    Luo, Huihong
    Cao, Yang
    Hu, Feifei
    Lin, Xubin
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND NETWORKS, VOL III, CENET 2023, 2024, 1127 : 182 - 189