首页 | 本学科首页   官方微博 | 高级检索  
     

XML文档的加密访问控制与传输
引用本文:孟健,曹立明,王小平,姚亮.XML文档的加密访问控制与传输[J].计算机应用,2006,26(5):1061-1063.
作者姓名:孟健  曹立明  王小平  姚亮
作者单位:同济大学,计算机科学与技术系,上海,200092
摘    要:以XML文档的特殊结构为基础,将加密与访问控制结合起来,提出了一个访问控制模型(Access Control Model, ACM)。根据访问控制模型,按照主机角色及其特点、主机角色间的关系和访问控制策略库(Access Control Base, ACB),设计了XML文档分组加密算法,产生密钥对照表,进行密钥分配与管理,将依据一个或多个密钥对XML文档解密的任务交给主机,减轻服务器的负担;根据访问控制策略对主机的访问权限进行时间限制,在访问控制模型的基础上提出依据访问控制权限,将加密后的XML文档安全传送给不同级别主机,并进行安全检查的方法。

关 键 词:XML  访问控制  粒度  加密
文章编号:1001-9081(2006)05-1061-03
收稿时间:2005-11-04
修稿时间:2005-11-042006-01-16

Encryption access control and transmission of XML documents
MENG Jian,CAO Li-ming,WANG Xiao-ping,YAO Liang.Encryption access control and transmission of XML documents[J].journal of Computer Applications,2006,26(5):1061-1063.
Authors:MENG Jian  CAO Li-ming  WANG Xiao-ping  YAO Liang
Affiliation:Department of Computer Science and Technology, Tong~i University, Shanghai 200092, China
Abstract:Extensible Markup Language (XML) has become the standard for data interchange on the Internet. In this paper, based on the special structure of XML documents, an access control model (ACM) was brought forth. According to this access control model and different roles of hosts, their characteristics, their relationships and access control base (ACB), an algorithm of grouping and encrypting XML documents was designed. Key-collation table was created and keys were distributed and managed. Hosts use one or more keys to decrypt XML documents and the server is set free. The access of hosts is temporally controlled by ACB. On the basis of access control model, the method of transmitting securely XML documents encrypted according to access control privileges, to hosts of different grades, and the method of security check-up were put forward.
Keywords:XML
本文献已被 CNKI 维普 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号