Proceedings of the 2nd International ICST Conference on Scalable Information Systems 2007
DOI: 10.4108/infoscale.2007.947
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Mandatory Access Control Policy for XML Databases

Abstract: A flexible mandatory access control policy (MAC) for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of applications. In order to preserve the integrity of data in XML databases, a constraint between a read access rule and a write access rule in label access policy is introduced. Rules for label assignment and propagation are proposed to alleviate the workload of label assignment. Also, a solution for resolving conflicts of label ass… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Many access control models have been proposed and used. The traditional types are discretionary access control (DAC), mandatory access control (MAC), and role base access Control (RBAC) [1][2][3][4][5]. There are many other types that are non-traditional, such as function based access control and purpose based access control [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Many access control models have been proposed and used. The traditional types are discretionary access control (DAC), mandatory access control (MAC), and role base access Control (RBAC) [1][2][3][4][5]. There are many other types that are non-traditional, such as function based access control and purpose based access control [6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Access control models for XML databases can be categorized into the discretionary access control model (DAC) [8], the mandatory access control model (MAC) [6,7], and role based access control (RBAC) [4,5,6,7,8]. Traditional access models are limited in that they are static and focused mostly on protection from outsiders.…”
Section: Introductionmentioning
confidence: 99%