Meijuan Wang’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (2)


Extensible markup language keywords search based on security access control
  • Article

January 2018

·

18 Reads

·

5 Citations

International Journal of Grid and Utility Computing

Meijuan Wang

·

·

Kejun Guo

With increasing rate of storing and sharing information in the cloud by the users, data storage brings new challenges to the Extensible Markup Language (XML) database in big data environments. The efficient retrieval of data with protection and privacy issues for accessing mass data in the cloud is more and more important. Most of existing research about XML data query and retrieval focuses on efficiency or establishing the index, and so on. However, these methods or algorithms do not take into account the data and data structure for their own safety issues. Furthermore, traditional access control rules read XML document node in a dynamic environment, relevant dynamic query-based keyword research data security and privacy protection requirements are not many. In order to improve the search efficiency with security condition, this paper examines how to generate the sub-tree of matching keywords that the user can access by the access control rules for the user's role. The corresponding algorithm is proposed to achieve safe and efficient keywords search.


Citations (2)


... A system is composed of objects like databases [2] and subjects like transactions and users. A transaction is allowed to read and write an object only if the transaction is granted access rights [11] to read and write data in the object, respectively. Suppose a transaction T 1 reads data d in an object o 1 and writes the data d in another object o 2 . ...

Reference:

Evaluation of a Protocol to Prevent Illegal Information Flow Based on Maximal Roles in the RBAC Model
Extensible markup language keywords search based on security access control
  • Citing Article
  • January 2018

International Journal of Grid and Utility Computing

... A system is composed of objects like databases [2] and subjects like transactions and users. A transaction is allowed to read and write an object only if the transaction is granted access rights [11] to read and write data in the object, respectively. Suppose a transaction T 1 reads data d in an object o 1 and writes the data d in another object o 2 . ...

Extensible markup language keywords search based on security access control
  • Citing Article
  • January 2018

International Journal of Grid and Utility Computing