A design methodology for user access control (UAC) middleware
XML repositories are increasingly becoming popular to store data or as an interoperability layer for legacy applications and data sources. The widespread use of XML highlights the need for flexible and expressive access control models for XML documents to protect sensitive and valuable information f...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE
2005
|
| Online Access: | http://hdl.handle.net/20.500.11937/14274 |
| _version_ | 1848748579510812672 |
|---|---|
| author | Steele, R. Gardner, W. Rajugan, Rajagopal Dillon, Tharam S. |
| author2 | Bob Werner |
| author_facet | Bob Werner Steele, R. Gardner, W. Rajugan, Rajagopal Dillon, Tharam S. |
| author_sort | Steele, R. |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | XML repositories are increasingly becoming popular to store data or as an interoperability layer for legacy applications and data sources. The widespread use of XML highlights the need for flexible and expressive access control models for XML documents to protect sensitive and valuable information from unauthorised access. Metadata for advanced context representation is likely to play an increasingly important role within access control models and languages for active Web data. Importantly, access control for both human users and machine users must be supported. This paper presents an XML views-based access control model, which supports access control for both human and machine data users. The design methodology we propose here is based on XML views and supports 'conceptual level' design of UAC constraints. |
| first_indexed | 2025-11-14T07:07:17Z |
| format | Conference Paper |
| id | curtin-20.500.11937-14274 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:07:17Z |
| publishDate | 2005 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-142742017-09-13T15:02:44Z A design methodology for user access control (UAC) middleware Steele, R. Gardner, W. Rajugan, Rajagopal Dillon, Tharam S. Bob Werner XML repositories are increasingly becoming popular to store data or as an interoperability layer for legacy applications and data sources. The widespread use of XML highlights the need for flexible and expressive access control models for XML documents to protect sensitive and valuable information from unauthorised access. Metadata for advanced context representation is likely to play an increasingly important role within access control models and languages for active Web data. Importantly, access control for both human users and machine users must be supported. This paper presents an XML views-based access control model, which supports access control for both human and machine data users. The design methodology we propose here is based on XML views and supports 'conceptual level' design of UAC constraints. 2005 Conference Paper http://hdl.handle.net/20.500.11937/14274 10.1109/EEE.2005.4 IEEE restricted |
| spellingShingle | Steele, R. Gardner, W. Rajugan, Rajagopal Dillon, Tharam S. A design methodology for user access control (UAC) middleware |
| title | A design methodology for user access control (UAC) middleware |
| title_full | A design methodology for user access control (UAC) middleware |
| title_fullStr | A design methodology for user access control (UAC) middleware |
| title_full_unstemmed | A design methodology for user access control (UAC) middleware |
| title_short | A design methodology for user access control (UAC) middleware |
| title_sort | design methodology for user access control (uac) middleware |
| url | http://hdl.handle.net/20.500.11937/14274 |