• Title/Summary/Keyword: XML security

Search Result 232, Processing Time 0.026 seconds

An Effective Query Rewriting Method in Secure XML Access Control (안전한 XML 접근제어에서 효율적인 질의 재작성 기법)

  • An, Dong-Chan;Byun, Chang-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.127-137
    • /
    • 2006
  • We propose two phase filtering scheme to develop an efficient mechanism for XML databases to control query-based access. An access control environment for XML documents and some techniques to deal with fine-grained authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query-based access. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form through a query optimization technique, which is guaranteed to have no access violations using tree-aware metadata of XML schemas. The scheme can be applied to any XML database management system and has several advantages such as small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

  • PDF

A Study on the Application Method of Digital Signature to International e-Trade over the Internet (인터넷 전자무역에서의 전자서명 적용방안 연구)

  • Park, Sang-Hwan;Lee, Seok-Lae;Park, Chu-Hwan
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.227-241
    • /
    • 2004
  • With the expansion of internet usage and the advanced technology for information and communication, the international e-Trade environment gradually migrates from the VAN/EDI to the global Internet-based e-Traed on an ebXML framework. In an effort to provide a Internet-based e-Trade environment with a security and trust, this paper analyzes security components and proposed the SSL and ebXML security technologies in order to assure of the trust and security over Internet-based e-Trade. In addition, this paper presents 3-phase methodology to realize the secure and trustworthy Internet-based e-Trade. In summary, as the first phase, the e-Trade business processes are re-engineered and the digital signature council for mutual recognition is orgainzed. And as the second phase, the Internet-based e-Trade system and the concerned digital signature technology are implemented. Finally as third phase, the PKI mutual recognition agreement is signed by parties concerned and then the Internet-based e-trade business is started. Furthermore, this paper presents the promising Internet-based e-Trade models where the digital signature can be applied.

  • PDF

A Study pn Development of collaborative Document Authoring system based on DOM (DOM에 기반한 공동 문서 저작 시스템 구현에 관한 연구)

  • Yu, Seong-Ju;Kim, Cha-Jong;Shin, Hyun-Sub
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2601-2608
    • /
    • 2010
  • It is difficult to merge text document and to remake use of documents on the most collaborative document authoring system using text document, and also to provide the storage place for saving and keeping documents. It has vulnerable drawbacks about the security though it provides the accessible abilities due to basing it on Web. In this paper, we design and implementation the collaborative document authoring system for XML document to improve a couple of problems on these systems. For these, we based on the DOM to manipulate the modeling object documents and utilized RMI on this system without considering socket communication when it transmits and receives Java objects. We improved the security through processes of authentication. By providing templates and editing functions such as annotation, visualization of document structures, we made easier making collaborative document authoring more than ever.

A Study on the Conformance and Interoperability of Information Security Technologies for Electronic Commerce (전자거래 정보보호 기술의 적합성 및 상호운영성에 관한 연구)

  • Sung, Baek-Ho;Lee, Hyoung-Seok;Cha, Mu-Hong;Shin, Dong-Il;Shin, Dong-Kyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1899-1902
    • /
    • 2003
  • 확장성과 유연성, 그리고 변환 편이성 등 XML의 상점을 기반으로 한 ebXML의 기술이 점차 확대되어 가고 있다. 하지만 현재 대부분의 XML 기반 거래 프레임워크에 대한 연구 및 지원은 실제 비즈니스를 수행하기 위한 개별적인 구성 요소의 구현 방법 연구에만 집중되어 왔다. 이로 인해 현재 국내의 보안 요소 기술과 상호운영성에 대한 연구가 구성 요소의 구현에 비해 상대적으로 취약한 것이 현실이다. 이에 본 논문은 XML 기반 정보보호와 상호운영성의 관련기술과 동향을 연구하였다.

  • PDF

A Study of the interoperability of XACML and PMI to enhance the security on EAM system (EAM시스템 보안을 위한 XACML과 PMI 상호운용에 관한 연구)

  • 박제원;정성우;이남용
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.400-402
    • /
    • 2004
  • EAM(Enterprise Access Management)은 SSO(Single Sign On)와 사용자 역할기반의 세분화된 접근관리를 제공하는 적극적 시스템 인증, 제어관리 솔루션으로 EAM 도입을 위해서는 중요한 자원들의 안전한 보관 관리가 필수적이다. 이를 위해 각 기업이나 그룹에서는 XML을 기반으로 한 여러 보안기술을 도입하고 있지만 현재 XML 정보 보안 기술을 중심으로 한 EAM시스템의 구현은 그 기반이 미미한 실정이며 표준에 따른 시스템의 고려도 미약한 실정이다. 특히 XML 정보보호기술과 기존 보안기술인 공개키 기반구조(Public Hey infrastructure, PKI), 권한관리구조 PMI(Privilege Management infrastructure)등과 같은 인증기술과의 상호연동기술에 관한 연구가 부족한 상태이다 이에 본 논문은 표준 XML 정보 보호기술 중 대표적인 기술인 XACML(extensible Access Control Markup Language)과 PMI를 연동한 안전한 EAM 통합 접근 시스템 구축 방안에 대친 연구하였다.

  • PDF

Design of Web Service by Using OPC XML-DA and OPC Complex Data for Automation and Control Systems

  • Tan Vu Van;Yoo Dae-Sung;Yi Myeong-Jae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06a
    • /
    • pp.250-252
    • /
    • 2006
  • Web technologies are gaining increased importance in automation and control systems. However, the choice of Web technologies depends on the use cases in the application environment. In industrial systems, the data can be got not only from many different field systems and devices but also from different OPC (OLE for Process Control) Servers. Current OPC Client might be able to read simple data from OPC Server, but there are some problems to get structured data and to exchange structured information between collaborating applications. Therefore, OPC Foundation has defined interfaces to OPC XML-DA (OPC XML Data Access) and OPC Complex Data that aim to solve those problems. The OPC XML-DA can facilitate the exchange of plant data across the internet, and upwards into the enterprise domain. In addition, the OPC Complex Data will extend the OPC DA specification to allow the OPC Client to read and decode any type of data from measurement and control systems on the plant floor. This paper will describe the concept of OPC XML-DA and OPC Complex Data. And then it proposes a mechanism to implement the OPC Complex Data into OPC XML-DA Server. Additionally, the paper also discusses the security aspects.

  • PDF

A Study on Security Models Access Control XML Document for Performance RBAC (RBAC 기법의 성능을 고려한 XML 문서 접근제어 보안모델에 관한연구)

  • Kim, Moon-Seok;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1226-1229
    • /
    • 2007
  • XML(eXtensible Markup Language)은 문서구조나 내용, 스타일의 자유로운 표현, 웹상에서 구조화된 문서의 전송이 가능하도록 설계된 표준 마크업 언어로, HTML에 비해 인터넷상에서의 정보 및 문서교환, 정보 검색 둥 이 편리한 장점을 갖는다. 그러나 XML 데이터가 방대해지고 복잡해짐에 따라 접근제어 정책을 규정하고 수행하기 위한 모델과 메커니즘의 필요에 따라 RBAC를 기반으로 하는 모델과 메커니즘에 대한 연구가 이루어지고 있다. 그러나 기존 연구들은 개념적 모델들 위주로 연구의 초점이 되어 있어 실제 모델 구현 시 시간적 공간적 오버헤드가 발생하는 단점이 있다. 따라서 본 연구에서는 XML 문서의 RBAC 기법을 기반으로 하는 노드의 권한 정보를 가지고 있는 접근 권한 트리 모델을 제안하였다. 이를 이용하여 노드권한에 모든 정보를 저장하고 권한을 가지는 구성요소에 접근할 경우나 권한을 추가로 부여하는 경우에 XML 엘리먼트, 속성, 링크 등의 세부요소에 대한 권한 체크 시간을 감소시켜 사용자에게 빠른 뷰를 제공할 수 있는 성능이 우수한 모델을 제시 하고자 한다.

A Development Method for Standardized Document Model of Structural Calculation Document (구조계산서의 표준화된 문서모델 구축 방법)

  • Kim, Bong-Geun;Park, Sang-Il;Kim, Hyo-Jin;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.83-91
    • /
    • 2008
  • Most construction information is being recorded in the form of electronic document. However, design documents generated in current practice are not suitable in share and exchange of information for disaster management. This study proposes how to develop th e XML Schema based semantic model of structural calculation document (SCD) for systematic storage and management of SCD information. in addition, 5 basic data types are developed for various expression forms appeared in the structural calculation documents. A prototype semantic model for steel bridge superstructure is developed based on the proposed method, and it is observed that the proposed method can be effectively used to build a standardized semantic model of SCD.

  • PDF

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Security to AJAX (AJAX 기술과 보안)

  • Ryu, Song-Su;No, Bong-Nam
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.621-625
    • /
    • 2006
  • AJAX(Asynchronous Javascript and XML) 이란 기존에 존재하는 기술들의 조합으로 이루어진 새로운 웹 플랫폼 기반 어플리케이션 개발 기술이다. 데스크탑 어플리케이션과 같은 기능을 웹에서 실행 가능하게 하는 가능성을 가지고 있는 기술로, 앞으로의 웹 어플리케이션의 방향성을 제시하고 있다. 본 논문에서는 Ajax에 사용되어지는 기술들을 소개하고, Ajax의 특징 및 사용 예를 살펴보고, Ajax에서의 보안문제에 대해서 소개한다.

  • PDF