“…These parts consist of an operation recorder, an error detector, an operation evaluator, and a trust calculator. The operation recorder records errors and bad transactions in the Xlog file [16]. The Xlog file is designed to be dynamic and to be stored temporarily for a set period to reduce storage and improve searching performance.…”
Section: The Trust Modulementioning
confidence: 99%
“…The trust values are updated according to an evaluation of the user's history. In our previous work [14][15][16][17][18][19], we proposed the use of trust based access control for XML databases which could provide dynamic access control and solve misuse problems from both outsiders and insiders.…”
“…These parts consist of an operation recorder, an error detector, an operation evaluator, and a trust calculator. The operation recorder records errors and bad transactions in the Xlog file [16]. The Xlog file is designed to be dynamic and to be stored temporarily for a set period to reduce storage and improve searching performance.…”
Section: The Trust Modulementioning
confidence: 99%
“…The trust values are updated according to an evaluation of the user's history. In our previous work [14][15][16][17][18][19], we proposed the use of trust based access control for XML databases which could provide dynamic access control and solve misuse problems from both outsiders and insiders.…”
“…In our previous work [16,17,18,19,20,21,22], we proposed, implemented, and evaluated applying trust based access control for XML databases. The model tracks users' errors and bad transactions over time and updates their privileges dynamically.…”
Abstract-XML databases are widely used in many different areas. They are multi user systems and can store a huge amount of data. Sensitive and important data need to be protected and stored securely. We have developed a dynamic trust based access control for XML databases to improve the security level and prevent malicious transactions from both internal and external users. Our system tracks user history of errors and bad transactions and updates the access privileges depending on trust values. In this paper, we evaluate the use of trust based access control by measuring the real time cost. The experimental work is performed to test the access time with and without trust based access control and suggests that the approach, though costly is not prohibitively time consuming.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.