A design methodology for user access control (UAC) middleware
MetadataShow full item record
XML repositories are increasingly becoming popular to store data or as an interoperability layer for legacy applications and data sources. The widespread use of XML highlights the need for flexible and expressive access control models for XML documents to protect sensitive and valuable information from unauthorised access. Metadata for advanced context representation is likely to play an increasingly important role within access control models and languages for active Web data. Importantly, access control for both human users and machine users must be supported. This paper presents an XML views-based access control model, which supports access control for both human and machine data users. The design methodology we propose here is based on XML views and supports 'conceptual level' design of UAC constraints.
Showing items related by title, author, creator and subject.
Modelling the co-occurence of Streptococcus pneumoniae with other bacterial and viral pathogens in the upper respiratory tractJacoby, P.; Watson, K.; Bowman, J.; Taylor, A.; Riley, T.; Smith, D.; Lehmann, Deborah (2007)Go to ScienceDirect® Home Skip Main Navigation Links Brought to you by: The University of Western Australia Library Login: + Register Athens/Institution Login Not Registered? - User Name: Password: ...
Yuan-Hui, Sue; Dell, Peter (2010)Australian ISPs are unusual compared to other countries in that access is typically "capped". This refers to restricting the total volume of data that can be downloaded each month. Subscribers pay different prices for ...
Joly, Y.; Zeps, Nikolajs; Knoppers, B. (2011)Large-scale, public genomic databases have greatly improved the capacity of researchers to do genomic research. In order to ensure that the scientific community uses data from these public resources properly, data access ...