Enhance the XML Documents Security using Web Services
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (w3c) is quickly emerging as a new standard language for semi-structured data representation and transfer on the Internet. XML documents usually hold private information that cannot be shared by all user communities. So securing XML data is becoming increasingly important and several approaches have been created to protect information in websites. Usage control has been considered as the next generation access control model with differentiating properties of decision continuity. It has been proven to be efficient to improve security administration with flexible authorization management. Usage control changes finer-grained control over usage of digital objects than that of traditional access control policies and models. XML schema defines format and contents of xml instance. Access control established on a schema will be transported to all its instances. Also, XML schema supplies a mechanism to build relationships between schemas and elements. We present a usage control model to protect information distributed on the web. As privacy becomes a major refer for consumers and enterprises, many research have been concentrated on the privacy protecting technology in recent years. In this paper, We present a comprehensive approach for usage access control established on the notion purpose. In our model, purpose information connected with a given data element specifies the intended use of the subjects and objects in the usage access control model. A key feature of our model is that it accepts when an access is required, the access purpose is checked against the intended purposes for the data item. We suggest an approach to represent purpose information to support access control established on purpose information. Finally comparisons with related works are analyzed.
Authors and Affiliations
K. L. N. Durga , Dr. N. Chandra Sekhar Reddy , Chaitanya
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...
Improving the Efficiency of Call Admission Control in Wireless Cellular Communication Networks by Frequency Sharing Techniques
In this paper, a two-tier cellular communication wireless network is characterized by overlapping the service area for managing the new calls users having different mobility speed. The overlapping property of the two-tie...
A Survey of an Adaptive Weighted Spatio-Temporal Pyramid Matching For Video Retrieval
Recently, in the field of video analysis and retrieval Human action recognition in video is an important research and challenging topic. An efficient video retrieval is needed to search most similar and relevant video co...