Access Control Method with XML Databases

Access Control Method with XML Databases

Lili Sun, Yan Li, Hua Wang
ISBN13: 9781609601386|ISBN10: 1609601386|EISBN13: 9781609601409
DOI: 10.4018/978-1-60960-138-6.ch013
Cite Chapter Cite Chapter

MLA

Sun, Lili, et al. "Access Control Method with XML Databases." Information Systems and New Applications in the Service Sector: Models and Methods, edited by John Wang, IGI Global, 2011, pp. 227-239. https://doi.org/10.4018/978-1-60960-138-6.ch013

APA

Sun, L., Li, Y., & Wang, H. (2011). Access Control Method with XML Databases. In J. Wang (Ed.), Information Systems and New Applications in the Service Sector: Models and Methods (pp. 227-239). IGI Global. https://doi.org/10.4018/978-1-60960-138-6.ch013

Chicago

Sun, Lili, Yan Li, and Hua Wang. "Access Control Method with XML Databases." In Information Systems and New Applications in the Service Sector: Models and Methods, edited by John Wang, 227-239. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-138-6.ch013

Export Reference

Mendeley
Favorite

Abstract

XML documents usually contain private information that cannot be shared by every user communities. It is widely used in web environment. XML database is becoming increasingly important since it consists of XML documents. Several applications for supporting selective access to data are available over the web. Usage control has been considered as the next generation access control model with distinguishing properties of decision continuity. It has been proven efficient to improve security administration with flexible authorization management. Object-oriented database systems represent complex data structure and XML databases may be stored in the objects-oriented database system. Therefore authorization models for XML databases could be used the same the models as object-oriented databases. In this paper, we propose usage control models to access XML databases and compare with an authorization model designed for object-oriented databases. We have analysed the characteristics of various access authorizations and presented detailed models for different kinds of authorizations. Finally, comparisons with related works are analysed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.