Abstract

Using XML in environments with multiple levels of security presents a number of challenges. From a confidentiality standpoint, users must be prevented from accessing data elements above their clearance, while at the same time be prevented from leaking data to lower levels through write operations. This work employs a security tagging approach to ensure each element in a document is appropriately labeled for a mandatory access control environment. Operations include not only read, but insert, update and delete, all with sensitivity to potentially polyinstantiated or dominating elements.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.