Font Size: a A A

Research On XML Inference Control Based On Constraints

Posted on:2007-09-07Degree:MasterType:Thesis
Country:ChinaCandidate:X L ChenFull Text:PDF
GTID:2178360242961840Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Constraints inference is used to get sensitive information which is limited in access, inference attack occurs. In XML application field, constraints inference is a security attack measure, which is more dangerous and hidden than other measures. It is urgent to research and develop an efficient method to prevent sensitive information leakage inferred through constraints.Ameliorated the fine-grained XML access control model based on the enhanced BLP MAC model, designed an architecture of fine-grained XML inference control based on constraints, which can works with C/S and B/S model. The architecture makes the positive inference using view mechanism, finally formed the maximal publishing files without sensitive information inference.The partial file inference closure formed with positive inference is the base of inference control. Standardization and optimization of XML constraints make it possible accessing and controlling XML file using constraints; Partitioned the sensitive information into high level and partial sensitive information formally, with the architecture, it can control the sensitive information inference of MAC and RBAC, designed the corresponding algorithm of inference closure construction.Negative inference is the key of the architecture presented, which find out all the nodes lead to sensitive information inference through backdating the inference chain, and cut down. Implemented search of sensitive information inference channel and formed the best solution of nodes removal quickly using heuristic search, and published the maximum information through the pruning strategies.Finally, testified the validity, usability, and correctness of the architecture of sensitive information inference control by experimentation.
Keywords/Search Tags:fine-grained, constraints inference, sensitive information, closure, pruning
PDF Full Text Request
Related items