An extended role based access control method for XML documents

2004 ◽  
Vol 9 (5) ◽  
pp. 740-744
Author(s):  
Meng Xiao-feng ◽  
Luo Dao-feng ◽  
Ou Jian-bo
Author(s):  
Tomasz Müldner ◽  
Robin McNeill ◽  
Jan Krzysztof Miziołek

Popularity of social networks is growing rapidly and secure publishing is an important implementation tool for these networks. At the same time, recent implementations of access control policies (ACPs) for sharing fragments of XML documents have moved from distributing to users numerous sanitized sub-documents to disseminating a single document multi-encrypted with multiple cryptographic keys, in such a way that the stated ACPs are enforced. Any application that uses this implementation of ACPs will incur a high cost of generating keys separately for each document. However, most such applications, such as secure publishing, use similar documents, i.e. documents based on a selected schema. This paper describes RBAC defined at the schema level, (SRBAC), and generation of the minimum number of keys at the schema level. The main advantage of our approach is that for any application that uses a fixed number of schemas, keys can be generated (or even pre-generated) only once, and then reused in all documents valid for the given schema. While in general, key generation at the schema level has to be pessimistic, our approach tries to minimize the number of generated keys. Incoming XML documents are efficiently encrypted using single-pass SAX parsing in such a way that the original structure of these documents is completely hidden. We also describe distributing to each user only keys needed for decrypting accessible nodes, and for applying the minimal number of encryption operations to an XML document required to satisfy the protection requirements of the policy.


2012 ◽  
Vol 433-440 ◽  
pp. 7042-7045
Author(s):  
Zhong Wen Gao ◽  
Ming Sheng Zhang

In light of the problem of the security of Peer-to-Peer networks, an access control method is proposed which is based on the trust relationship between the peers in this paper. Thus the peers of different trust values can get different access authorities.


Author(s):  
Alberto De la Rosa Algarín ◽  
Timoteus B. Ziminski ◽  
Steven A. Demurjian ◽  
Yaira K. Rivera Sánchez ◽  
Robert Kuykendall

2018 ◽  
Vol 7 (3) ◽  
pp. 1795
Author(s):  
Rini Mahajan ◽  
Manish Mahajan ◽  
Dheerendra Singh

Cloud computing has changed the perspective of information storage worldwide; still it has not fully matured. Security, privacy and access control of the stored data is the biggest concern in the IT industries and these are the major research areas in the field of cloud computing. Although many researchers have proposed variety of access control methods, still there is a scope of improvement. The main objective of this paper is to study the limitations of formerly proposed access control methods and to propose a better new access control method. It is the combination of Attribute based access control (ABAC), Hierarchical Role based access control (HRBAC) and Policy based authentica-tion. As a result we got a fine grained access control method. It also includes the feature of role delegation which is very important in pre-sent scenarios. Comparative analysis shows that proposed method combined many new features with existing access control methods to make the system sound.  


Sign in / Sign up

Export Citation Format

Share Document