Enhance the XML Documents Security using Web Services
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
An increasing amount of semi-structured data, XML has become fundamental to humans and programs. XML changed by the World Wide Web Consortium (w3c) is quickly emerging as a new standard language for semi-structured data representation and transfer on the Internet. XML documents usually hold private information that cannot be shared by all user communities. So securing XML data is becoming increasingly important and several approaches have been created to protect information in websites. Usage control has been considered as the next generation access control model with differentiating properties of decision continuity. It has been proven to be efficient to improve security administration with flexible authorization management. Usage control changes finer-grained control over usage of digital objects than that of traditional access control policies and models. XML schema defines format and contents of xml instance. Access control established on a schema will be transported to all its instances. Also, XML schema supplies a mechanism to build relationships between schemas and elements. We present a usage control model to protect information distributed on the web. As privacy becomes a major refer for consumers and enterprises, many research have been concentrated on the privacy protecting technology in recent years. In this paper, We present a comprehensive approach for usage access control established on the notion purpose. In our model, purpose information connected with a given data element specifies the intended use of the subjects and objects in the usage access control model. A key feature of our model is that it accepts when an access is required, the access purpose is checked against the intended purposes for the data item. We suggest an approach to represent purpose information to support access control established on purpose information. Finally comparisons with related works are analyzed.
Authors and Affiliations
K. L. N. Durga , Dr. N. Chandra Sekhar Reddy , Chaitanya
Mining of Spatially Co-Located Moving Objects by Using CTMSPMINE
In day to day life, vehicles have become important aspects in human life where each vehicle is manufactured for a particular purpose. Co-location pattern discovery is intended towards the processing data with spatial per...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...
Secure Similarity Search on Outsourced Metric Data
Cloud computing has become an affordable technology for outsourcing data. This will help individuals and organizations to have plethora benefits such as storage, platform, software and other services. In spite of the adv...
Embedding a Non-Standard Encryption/Decryption Method with Mathematical Draw Function to Meet Challenges in Mobility
Our innovation and personal information are passes through air in wireless network and their secrecy can be preserved by using any one of the encryption method. Nowadays mobile plays a vital role in passing messages and...
Mining Techniques in Health Care: A Survey of Immunization
data processing has been used intensively and generally by many organizations. The applications will greatly profit all parties concerned within the aid business. The aid background is usually supposed as being info a lo...