Paper Title:
A Implement of Access Control Based Multi-Polices Using XML
  Abstract

A multi-polices access control model is proposed, with the model, access control based on policy regulation and XML based policy description is given. At the same time, We use the XSD(XML Schema Definition) to describe the content and the structure of the xml documents, and check the validity of the xml documents. Based on the description of the access control, an application system is realized we construct the runtime platform and choose some access control polices to test our system. The result is well.

  Info
Periodical
Advanced Materials Research (Volumes 121-122)
Edited by
Donald C. Wunsch II, Honghua Tan, Dehuai Zeng, Qi Luo
Pages
558-562
DOI
10.4028/www.scientific.net/AMR.121-122.558
Citation
T. Peng, M. H. Jiang, M. Hu, "A Implement of Access Control Based Multi-Polices Using XML", Advanced Materials Research, Vols. 121-122, pp. 558-562, 2010
Online since
June 2010
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Shi Hong Feng, Zhao Liang Jiang
Abstract:With the development of Information Technolo gy, distributed integrated system of PDM and CAPP has being focused on by many researchers. To...
573
Authors: Tao Peng, Ming Hua Jiang, Ming Hu
Abstract:A multi-policy access control model is proposed, with the model, access control based on policy regulation and XML based policy description...
970
Authors: Long Jun Huang, Cai Ying Zhou, Yuan Wang Wei, Li Ping Dai
Abstract:The scale of modern systems is increasingly large, the system safety requirements have become more sophisticated, a single access control...
1081
Authors: Jin Li
Chapter 20: Computer Applications in Industry and Engineering
Abstract:For analyzing the multilayer structure of the J2EE, based on Role-Based Access Control, a model of privilege management infrastructure was...
3125
Authors: Ya Qin Fan, Ge Zhang, Fei Fei Li, Xin Zhang
Chapter 3: Information Technologies, WEB and Networks Engineering, Information Security, E-Engineering, Software Application and Development
Abstract:Abstract: in order to solve the access control system loopholes, can appear the problem of chaotic management, security failure and conflict...
1299