A design methodology for user access control (UAC) middleware
Access Status
Authors
Date
2005Type
Metadata
Show full item recordCitation
Source Title
Source Conference
ISBN
Collection
Abstract
XML repositories are increasingly becoming popular to store data or as an interoperability layer for legacy applications and data sources. The widespread use of XML highlights the need for flexible and expressive access control models for XML documents to protect sensitive and valuable information from unauthorised access. Metadata for advanced context representation is likely to play an increasingly important role within access control models and languages for active Web data. Importantly, access control for both human users and machine users must be supported. This paper presents an XML views-based access control model, which supports access control for both human and machine data users. The design methodology we propose here is based on XML views and supports 'conceptual level' design of UAC constraints.
Related items
Showing items related by title, author, creator and subject.
-
Yuan-Hui, Sue; Dell, Peter (2010)Australian ISPs are unusual compared to other countries in that access is typically "capped". This refers to restricting the total volume of data that can be downloaded each month. Subscribers pay different prices for ...
-
Joly, Y.; Zeps, Nikolajs; Knoppers, B. (2011)Large-scale, public genomic databases have greatly improved the capacity of researchers to do genomic research. In order to ensure that the scientific community uses data from these public resources properly, data access ...
-
Burke, T.; Stone, J.; Glackin, S.; Scheurer, Jan (2014)Despite the plethora of rental research, a significant gap remains in understanding the relationship between rental housing and 'transport disadvantage'. This project analyses the changing spatial concentration of ...