期刊文献+

A fine-grained access control model for relational databases

A fine-grained access control model for relational databases
原文传递
导出
摘要 Fine-grained access control (FGAC) must be supported by relational databases to satisfy the requirements of privacy preserving and Internet-based applications.Though much work on FGAC models has been conducted,there are still a number of ongoing problems.We propose a new FGAC model which supports the specification of open access control policies as well as closed access control policies in relational databases.The negative authorization is supported,which allows the security administrator to specify what data should not be accessed by certain users.Moreover,multiple policies defined to regulate user access together are also supported.The definition and combination algorithm of multiple policies are thus provided.Finally,we implement the proposed FGAC model as a component of the database management system (DBMS) and evaluate its performance.The performance results show that the proposed model is feasible. Fine-grained access control (FGAC) must be supported by relational databases to satisfy the requirements of privacy preserving and Internet-based applications. Though much work on FGAC models has been conducted, there are still a number of ongoing problems. We propose a new FGAC model which supports the specification of open access control policies as well as closed access control policies in relational databases. The negative authorization is supported, which allows the security admin- istrator to specify what data should not be accessed by certain users. Moreover, multiple policies defined to regulate user access together are also supported. The definition and combination algorithm of multiple policies are thus provided. Finally, we imple- ment the proposed FGAC model as a component of the database management system (DBMS) and evaluate its performance. The performance results show that the proposed model is feasible.
出处 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2010年第8期575-586,共12页 浙江大学学报C辑(计算机与电子(英文版)
基金 Project (No.2006AA01Z430) supported by the National High-Tech Research and Development Program (863) of China
关键词 Fine-grained access control Database security PROHIBITION Multiple policies Fine-grained access control, Database security, Prohibition, Multiple policies
  • 相关文献

参考文献24

  • 1Agrawal,R.,Kiernan,J.,Srikant,R.,Xu,Y.,2002.Hippocratic Databases.Prec.Very Large Data Bases,p.563-574.
  • 2Agrawal,R.,Bird,P.,Grandison,T.,Kiernan,J.,Logan,S.,Rjaibi,W.,2005.Extending Relational Database Systems to Automatically Enforce Privacy Policies.Prec.21st Int.Conf.on Data Engineering,p.1013-1022.[doi:10.1109/ICDE.2005.54].
  • 3Al-Kahtani,M.A.,Sandhu,R.,2004.Rule-Based RBAC with Negative Authorization.Prec.20th Annual Computer Security Applications Conf.,p.405-415.[doi:10.1109/CSAC.2004.32].
  • 4Barker,S.,2008.Dynamic meta-level access control in SQL.LNCS,5094:1-16.[doi:10.1007/978-3-540-70567-3_1].
  • 5Bertino,E.,Sandhu,R.,2005.Database security-concepts,approaches,and challenges.IEEE Trans.Depend.Secur.Comput.,2(1):2-19.[doi:10.1109/TDSC.2005.9].
  • 6Bertino,E.,Samarati,P.,Jajodia,S.,1997.An extended authorization model for relational database.IEEE Trans.Knowl.Data Eng.,9(1):85-101.[doi:10.1109/69.567051].
  • 7Bertino,E.,Byun,J.W.,Li,N.,2005.Privacy-preserving database systems.LNCS,3655:178-206.[doi:10.1007/11554578_6].
  • 8Bynn,J.W.,Bertino,E.,Li,N.,2005.Purpose Based Access Control of Complex Data for Privacy Protection.Prec.10th ACM Symp.on Access Control Models and Technologies,p.102-110.[doi:10.1145/1063979.1063998].
  • 9Chaudhuri,S.,Dutta,T.,Sudarshan,S.,2007.Fine Grained Authorization Through Predicated Grants.Int.Conf.on Data Engineering,p.1174-1183.[doi:10A 109/ICDE.2007.368976].
  • 10Da Meng Database Corporation,2000.DM Database.Available from http://www.dameng.com/dmweb/[Accessed on Feb.14,2009].

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部