About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Scalable Information Systems

Research Article

A Flexible Mandatory Access Control Policy for XML Databases

Download1041 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/infoscale.2007.947,
        author={Hong Zhu and Renchao Jin and Kevin L\'{y}},
        title={A Flexible Mandatory Access Control Policy for XML Databases},
        proceedings={2nd International ICST Conference on Scalable Information Systems},
        proceedings_a={INFOSCALE},
        year={2010},
        month={5},
        keywords={Database Security XML database Mandatory access control},
        doi={10.4108/infoscale.2007.947}
    }
    
  • Hong Zhu
    Renchao Jin
    Kevin Lü
    Year: 2010
    A Flexible Mandatory Access Control Policy for XML Databases
    INFOSCALE
    ICST
    DOI: 10.4108/infoscale.2007.947
Hong Zhu1,*, Renchao Jin2,*, Kevin Lü3,*
  • 1: Huazhong University of Science and Technology, Wuhan, Hubei 430074, P.R.China +86-27-87544400
  • 2: Huazhong University of Science and Technology, Wuhan, Hubei 430074, P.R.China +86-27-87792212
  • 3: Brunel University, BBS, Room 76, Tin Building, Brunel University, Uxbridge, UK UB8 3PH +44-01895-265254
*Contact email: zhuhong@public.wh.hb.cn, jrc@hust.edu.cn, Kevin.Lu@Brunel.ac.uk

Abstract

A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of applications. In order to preserve the integrity of data in XML databases, a constraint between a read access rule and a write access rule in label access policy is introduced. Rules for label assignment and propagation are proposed to alleviate the workload of label assignment. Also, a solution for resolving conflicts of label assignments is proposed. At last, operations for implementation of the MAC policy in a XML database are illustrated.

Keywords
Database Security, XML database, Mandatory access control
Published
2010-05-16
Modified
2011-09-11
http://dx.doi.org/10.4108/infoscale.2007.947
Copyright © 2007–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL