{"title":"Ontology Security Strategy of Security Data Integrity","authors":"Yulong Meng, Guisheng Yin, Ke Geng","doi":"10.1109/ICICSE.2009.43","DOIUrl":null,"url":null,"abstract":"There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.","PeriodicalId":193621,"journal":{"name":"2009 Fourth International Conference on Internet Computing for Science and Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International Conference on Internet Computing for Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICSE.2009.43","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
There exists a variety of heterogeneous data that need to be integrated within a secure domain. How to integrate the security data from various data source safely is a challenge for database researchers. In this paper, we introduce a new model for security data integrity, Weight-value-Extended MLS (WEMLS), which is development based on MLS. Compared with MLS, WEMLS can not only guarantee the security and integrity of data accessing, but also provide a more flexible mechanism for data accessing. Finally, WEMLS has been verified by proposing a security data integration model based on ontology.