Secure access policy for efficient resource in mobile computing environment

被引:1
作者
Jo S.-M. [1 ]
机构
[1] Department of Computer Information Technology Education, Pai Chai University, 155-40 Baejae-ro, Seo-Gu, Daejeon
关键词
Access control; Mobile computing; Policy; Security; XML;
D O I
10.1007/s11416-017-0301-y
中图分类号
学科分类号
摘要
As the Internet was activated and the mobile environment developed, it has become more common to access dynamic XML data regardless of location and time. XML is widely used for information exchange and representation of data for databases, applications, etc., using the advantage to describe information. As a result, large-capacity XML data becomes increasingly complex, and demand for data access policies is increasing. Security issues such as authorization of access to resources, authentication, security enhancement and privacy arise. The mobile computing environment differs from existing information systems in several ways, so it is difficult to apply the existing access control as it is. Therefore, this paper proposes a secure access policy method for query processing to enable efficient resource management in dynamic XML data environment. The results of the evaluation are also presented to show that the additionally proposed method is efficient and excellent. © 2017, Springer-Verlag France SAS.
引用
收藏
页码:297 / 303
页数:6
相关论文
共 50 条
  • [41] A Resource-Efficient Integrity Monitoring and Response Approach for Cloud Computing Environment
    Gupta, Sanchika
    Kumar, Padam
    Abraham, Ajith
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 335 - 349
  • [42] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [43] Secure Peripherals in a Converged Mobile Environment
    du Toit, Jaco
    Ellefsen, Ian
    HUMAN ASPECTS OF INFORMATION SECURITY, PRIVACY AND TRUST (HAS 2017), 2017, 10292 : 296 - 308
  • [44] SCALABLE, SECURE, MOBILE COMPUTING WITH LOCATION INFORMATION
    SPREITZER, M
    THEIMER, M
    COMMUNICATIONS OF THE ACM, 1993, 36 (07) : 27 - 27
  • [45] Efficient channel allocation tree generation for data broadcasting in a mobile computing environment
    Peng, WC
    Chen, MS
    WIRELESS NETWORKS, 2003, 9 (02) : 117 - 129
  • [46] Access-Pattern Aware Checkpointing Data Storage Scheme for Mobile Computing Environment
    Li, Xiang
    Yang, Mei
    Men, ChaoGuang
    Jiang, YingTao
    Udagepola, Kalum
    9TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC'14) / THE 11TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC'14) / AFFILIATED WORKSHOPS, 2014, 34 : 330 - 337
  • [47] Efficient Channel Allocation Tree Generation for Data Broadcasting in a Mobile Computing Environment
    Wen-Chih Peng
    Ming-Syan Chen
    Wireless Networks, 2003, 9 : 117 - 129
  • [48] Resource and Trajectory Optimization for Secure Communications in Dual Unmanned Aerial Vehicle Mobile Edge Computing Systems
    Lu, Weidang
    Ding, Yu
    Gao, Yuan
    Hu, Su
    Wu, Yuan
    Zhao, Nan
    Gong, Yi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (04) : 2704 - 2713
  • [49] Energy-Efficient Secure Computation Offloading in Wireless Powered Mobile Edge Computing Systems
    Wu, Mengru
    Song, Qingyang
    Guo, Lei
    Lee, Inkyu
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (05) : 6907 - 6912
  • [50] A framework for resource security in mobile computing
    Yu, WJ
    Mok, AK
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2002, : 312 - 317