期刊文献+

基于关系数据库的极松散结构数据模型的访问控制研究 被引量:7

Access Control in Very Loosely Structured Data Model Using Relational Databases
下载PDF
导出
摘要 本文提出一个针对数据空间环境下极松散结构模型的细粒度和动态的访问控制框架:首先定义通用的极松散结构模型GLSDM(General very Loosely-Structured Data Model);给出GLSDM到关系表的映射方法,将GLSDM上细粒度的访问控制转换为关系表的row、cell等安全级别的访问;通过动态查询重写,在用户执行查询时将GLSDM的权限信息添加到SQL语句中,从而实现GLSDM的动态访问控制.理论和实验证明该框架是可行和有效的,本文的映射方法和动态查询重写算法能够保证对GLSDM的访问控制通过等价的关系数据库的访问控制来实现. This paper proposes a framework to efficiently support dynamic,fine-grained access control for the very loosely structured data model,named GLSDM(General very Loosely-Structured Data Model),which is presented based on the current dataspace data models.In the framework,GLSDM is mapped into and stored in relational databases,and then the fine-grained access control in GLSDM is converted into the corresponding fine-grained security(e.g.,row-level and cell-level security) in relational databases.A query rewriting algorithm is also given to dynamically imbed GLSDM security information into SQL statements the user issues,thus,dynamic access control is realized during the period of query processing.Finally,the validity of the framework is proved by theory and experiment,that is,the GLSDMto-relational mapping method and query rewriting algorithm in this paper can ensure the access control in GLSDM is equivalent to that in relational databases.
出处 《电子学报》 EI CAS CSCD 北大核心 2012年第3期600-606,共7页 Acta Electronica Sinica
基金 国家自然科学基金(N.o60970044 No.60673135 No.60736020) 广东省自然科学基金(No.7003721) 广西教育厅科研项目(No.200807LX429)
关键词 访问控制 数据空间 关系数据库 松散结构 access control dataspace relational databases loosely structured
  • 相关文献

参考文献16

  • 1Franklin M,Halevy A,Maier D.From databases to dataspaces:a new abstraction for information management[J].ACM SIG-MOD Record,2005,34(4):27-33.
  • 2HalevyA,Franklin M,Maier D.Principles ofdataspace systems[A].Proceedings of 25th ACM SIGMOD-SIGACT-SIGARTSymposium on Principles of Database Systems[C].Chicago,IL,United States:Association for Computing Machinery,2006.1-9.
  • 3Jin L,Zhang Y,Ye X.An extensible data model with securitysupport for dataspace management[A].Proceedings of 10thIEEE International Conference onHigh Performance ComputingandCommunications[C].Dalian,China:IEEE,2008.556-563.
  • 4Dittrich J P,Salles M A.iDM a unified and versatile data mod-el for personal dataspace management[A].Proceedings of the32nd International Conference on Very Large Data Bases[C].Seoul,Korea:VLDB Endowment,2006.367-378.
  • 5Lee D,LeeWC,LiuP.SupportingXML securitymodels usingrelational databases:a vision[A].Proceedings of Xsym(XMLDatabase Symposium)[C].Berlin,Germany:Springer,2003.267-281.
  • 6Luo B,Lee D,Liu P.Pragmatic XML access control using off-the-shelf RDBMS[A].Proceedings of ESORICS(EuropeanSymposium OnResearch In Computer Security)[C].Dresden,Germany:Springer,2007.55-71.
  • 7Koromilas L,Chinis G,Fundulaki I,et al.Controlling access toXML documents over XML native and relational databases[A].Proceedings of Secure Data Management[C].Lyon,France:Springer,2009.122-141.
  • 8Lefevre K,Agrawal R,Ercegovac V,et al.Limiting disclosurein hippocratic databases[A].Proceedings ofthe Thirtieth Inter-national Conference on Very Large Data Bases[C].Toronto,Canada:VLDB Endowment,2004.108-119.
  • 9Chaudhuri S,Dutta T,Sudarshan S.Fine grained authorizationthrough predicated grants[A].Proceedings ofIEEE 23rd Inter-national Conference on Data Engineering[C].Istanbul,Turkey:IEEE,2007.1174-1183.
  • 10Barker S.Dynamic meta-level access control in SQL[A].Pro-ceedings of22nd Annual IFIP WG 11.3 Working Conferenceon Data and Applications Security[C].London,UK:Springer,2008.1-16.

二级参考文献26

  • 1翟征德.基于量化角色的可控委托模型[J].计算机学报,2006,29(8):1401-1407. 被引量:33
  • 2郑吉平,秦小麟,崔新春.基于数字水印的数据库角色访问控制模型[J].电子学报,2006,34(10):1906-1910. 被引量:4
  • 3Mavridis I,Mattas A,Pagkalos I,et al.Supporting dynamic administration of RBAC in web-based collaborative applications during run-time[J].International Journal of Information and Computer Security,2008,2(4):328-352.
  • 4Barka E,Sandhu R.Framework for role-based delegation models .Werner B.Proceedings of the 16th Annual Computer Security Applications Conference .New Orleans:IEEE Computer Society,2000.168-176.
  • 5Barka E,Sandhu R.A role-based delegation model and some extensions .Mehuron W.Proceedings of the 23rd National Information Systems Security Conference .Maryland:NIST,2000.101-114.
  • 6Barka E,Sandhu R.Role-based delegation model/hierarchical roles (RBDM1) .Thomsen D.Proceedings of the 20th Annual Computer Security Applications Conference .Washington DC:IEEE Computer Society,2004.396-404.
  • 7Zhang L,Ahn G J,Chu B T.A rule-based framework for role-based delegation and revocation[J].ACM Transactions on Information and System Security,2003,6(3):404-441.
  • 8Zhang X W,OH S,Sandhu R S.PBDM:A flexible delegation model in RBAC .Ferrari E.Proceedings of the 8th ACM Symposium on Access Control Models and Technologies .New York:ACM Press,2003.149-157.
  • 9Wainer J,Kumar A.A fine-grained,controllable user-to-user delegation method in RBAC .Ferrari E.Proceedings of the 10th ACM Symposium on Access Control Models and Technologies .New York:ACM Press,2005.59-66.
  • 10Cramption J,Khambhammettu H.Delegation in role-based access control[J].International Journal of Information Security,2008,7(2):123-136.

共引文献11

同被引文献43

引证文献7

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部