Lightweight XML authorization protection method in complex network environment
A complex network, authorization protection technology, applied in electrical components, transmission systems, etc., can solve the problems of data sharing that is difficult to achieve privacy protection and security, cannot consider server-side storage, authorization query time and security query efficiency at the same time. The effect of protecting secure data sharing, saving authorization query time, and high safety factor
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to make the objects and advantages of the present invention clearer, the present invention will be specifically described below in conjunction with examples. It should be understood that the following words are only used to describe one or several specific implementation modes of the present invention, and do not strictly limit the protection scope of the specific claims of the present invention.
[0027] Below to figure 1 The background legend of the shown network environment is taken as an example, and the method of the present invention is described, figure 1 In the middle is a server that stores shared XML documents, surrounded by users with arbitrary access purposes; if you want to obtain information, you must go through the steps of authorization processing before you can perform security queries. It is different from the previous server side (a set of tailor-made XML documents is prepared for each user with different access purposes, including structure...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


