Secure access policy for efficient resource in mobile computing environment

被引:1
|
作者
Jo S.-M. [1 ]
机构
[1] Department of Computer Information Technology Education, Pai Chai University, 155-40 Baejae-ro, Seo-Gu, Daejeon
关键词
Access control; Mobile computing; Policy; Security; XML;
D O I
10.1007/s11416-017-0301-y
中图分类号
学科分类号
摘要
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent. © 2017, Springer-Verlag France SAS.
引用
收藏
页码:297 / 303
页数:6
相关论文
共 50 条
  • [31] Towards Secure Resource Sharing for Impromptu Collaboration in Pervasive Computing
    Claycomb, William
    Shin, Dongwan
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 940 - 946
  • [32] Secure and efficient fine-grained data access control scheme in cloud computing
    Yang, Changsong
    Ye, Jun
    JOURNAL OF HIGH SPEED NETWORKS, 2015, 21 (04) : 259 - 271
  • [33] Secure and Efficient Mobile Payment Using QR Code in an Environment with Dishonest Authority
    Zhu, Xiaoling
    Hou, Zhengfeng
    Hu, Donghui
    Zhang, Jing
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 452 - 465
  • [34] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [35] A Secure and Efficient Data Sharing Scheme with Outsourced Signcryption and Decryption in Mobile Cloud Computing
    Fugkeaw, Somchart
    2021 IEEE INTERNATIONAL CONFERENCE ON JOINT CLOUD COMPUTING (JCC 2021) / 2021 9TH IEEE INTERNATIONAL CONFERENCE ON MOBILE CLOUD COMPUTING, SERVICES, AND ENGINEERING (MOBILECLOUD 2021), 2021, : 72 - 79
  • [36] Efficient utilization of bandwidth and storage capacity for recovery in mobile computing environment
    Zeng, L
    Gupta, B
    PROCEEDINGS OF 1999 SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 1999, : 97 - 101
  • [37] OFFLOADING WITH QOS IN THE MOBILE CLOUD COMPUTING ENVIRONMENT
    Arun, C.
    Prabu, K.
    PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 313 - 317
  • [38] Secure Access Policy (SAP): Invisibly Executing Speculative Unsafe Accesses in an Isolated Environment
    Meng, Xiaoni
    Yang, Qiusong
    Ci, Yiwei
    Zhao, Pei
    Zhao, Shan
    Huo, Tianlin
    Li, Mingshu
    2022 IEEE 40TH INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD 2022), 2022, : 80 - 88
  • [39] Secure and efficient authentication scheme for access control in mobile pay-TV systems
    Cui, Jingsong
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (03) : 292 - 310
  • [40] Secure DNA and Morse code based Profile access control models for Cloud Computing Environment
    Yadav, Monika
    Breja, Manvi
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2590 - 2598