欢迎来到天天文库
浏览记录
ID:37615549
大小:579.53 KB
页数:9页
时间:2019-05-26
《安全访问控制的XML关键字检索》由会员上传分享,免费在线阅读,更多相关内容在行业资料-天天文库。
1、ISSN1673-9418CODENJKYTA8E-mail:fcst@public2.bta.net.cnJournalofFrontiersofComputerScienceandTechnologyhttp://www.ceaj.org1673-9418/2010/04(01)-0073-09Tel:+86-10-51616056DOI:10.3778/j.issn.1673-9418.2010.01.008安全访问控制的XML关键字检索*李晓东+,朱皓,杨卫东复旦大学计算机科学技术学院,上海200433
2、*XMLKeywordSearchBasedonSecureAccessControl+,ZHUHao,YANGWeidongLIXiaodongCollegeofComputerScienceandTechnology,FudanUniversity,Shanghai200433,China+Correspondingauthor:E-mail:lixiaodong037@gmail.comLIXiaodong,ZHUHao,YANGWeidong.XMLkeywordsearchbasedonsecurea
3、ccesscontrol.JournalofFrontiersofComputerScienceandTechnology,2010,4(1):73-81.Abstract:XML(extensivemakeuplanguage)keywordsearchiseasytouse,andusersdonothavetounderstandtheschema,recentlyiswidespreadlyconcernedbythepeople.Currentresearchesaboutthekeywordsear
4、charemainlyfocusedonthealgorithmsandthesortoftheresults,butignorethesecurityissues.CombiningwithXMLkeywordsearchandXMLsecuritycontrol,forthefirsttime,thispaperresearchestheXMLkeywordsearchmethodbasedonsecureaccesscontrol,includingidentifyingtheXMLkeywordsear
5、chresultsbasedonthesecureaccesscontrolrules,establishingkeywordindexusingsecurityviewaswellaskeywordsearchalgorithmbasedontheabovetwoaspects,andthethreeaspectsaboveareonthebasisoftheXMLkeyword’ssmallestlowestcommonancestors(SLCA)andview-basedsecureaccesscont
6、rolrules.Theexperimentalresultshowsthatinordertosatisfythesecureaccesscontrolrules,thisalgorithmalthoughneedsextratimetogetthecorrectresultsbutisgenerallyefficient.Keywords:keywordsearch;XML(extensivemakeuplanguage)securityview;secureaccesscontrol;index摘要:XM
7、L(extensivemakeuplanguage)的关键字检索简单易用,用户不必了解数据库的模式,受到人们的广泛关注。当前的相关研究主要集中于关键字检索的算法以及返回结果的组织和排序,却忽视了其中的安全性问题。结合XML关键字搜索和XML安全控制,研究了基于安全访问控制的XML关键字检索技术。在XML关键字的最小最低公共祖先(smallestlowestcommonancestors,SLCA)和基于视图的安全访问控制规则的基础上,*TheNationalNaturalScienceFoundationofC
8、hinaunderGrantNo.60773076(国家自然科学基金);theKeyProjectofShanghaiun-derGrantNo.08JC1402500(上海市重点项目);theXiao-34-1underGrant(消-34-1).Received2009-05,Accepted2009-07.74JournalofFrontiersofComputerScience
此文档下载收益归作者所有