Unlock instant, AI-driven research and patent intelligence for your innovation.

Lightweight XML authorization protection method in complex network environment

A complex network, authorization protection technology, applied in electrical components, transmission systems, etc., can solve the problems of data sharing that is difficult to achieve privacy protection and security, cannot consider server-side storage, authorization query time and security query efficiency at the same time. The effect of protecting secure data sharing, saving authorization query time, and high safety factor

Pending Publication Date: 2020-12-25
NANJING INST OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a lightweight XML authorization protection method in a complex network environment, which can effectively solve the problem that the existing authorization scheme cannot simultaneously consider the server-side storage, authorization query time and security query efficiency, and it is difficult to achieve privacy protection security data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight XML authorization protection method in complex network environment
  • Lightweight XML authorization protection method in complex network environment
  • Lightweight XML authorization protection method in complex network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the objects and advantages of the present invention clearer, the present invention will be specifically described below in conjunction with examples. It should be understood that the following words are only used to describe one or several specific implementation modes of the present invention, and do not strictly limit the protection scope of the specific claims of the present invention.

[0027] Below to figure 1 The background legend of the shown network environment is taken as an example, and the method of the present invention is described, figure 1 In the middle is a server that stores shared XML documents, surrounded by users with arbitrary access purposes; if you want to obtain information, you must go through the steps of authorization processing before you can perform security queries. It is different from the previous server side (a set of tailor-made XML documents is prepared for each user with different access purposes, including structure...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a lightweight XML authorization protection method in a complex network environment. The authorization protection method comprises the following execution steps of: carrying out standardized preprocessing on a shared XML document; carrying out starting and ending interval coding, extracting a trunk structure tree, separating a trunk structure and leaf node content, and storing the trunk structure tree and an auxiliary information table containing the leaf node content at a server; forming a global authorization vector according to the leaf node coding information in thetrunk structure tree; filtering privacy according to access purposes of users and privacy policies, allocating different authorization vectors to the users with different access purposes, and then generating corresponding temporary authorization trees under the combination of the trunk structure tree and the authorization vectors; and performing security authorization query under the combined action of the temporary authorization trees and the auxiliary information table. According to the invention, the problem that the existing authorization scheme cannot consider the storage of the server,the authorization query time and the security query efficiency at the same time and data sharing of privacy protection security is difficult to realize can be effectively solved.

Description

technical field [0001] The invention relates to the technical field of lightweight XML authorization protection, in particular to a method for authorization protection of lightweight XML in a complex network environment. Background technique [0002] Extensible Markup Language, or XML for short, is a markup language used to mark electronic documents to make them structured. Nowadays, XML documents have become the representative of semi-structured data and are frequently used by various companies, enterprises and institutions, and are growing at an exponential rate year by year. Therefore, breaking information islands and promoting XML information sharing has become an inevitable trend. Data sharing has greatly improved resource utilization, and at the same time, through data mining potential value, it has brought potential benefits to related industries and the whole society. However, in the actual complex network environment, for shared XML documents (the core content of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10
Inventor 吴海涛郭丽红袁光尧
Owner NANJING INST OF TECH