Modeling XACML Security Policies Using Graph Databases

被引:2
|
作者
Paniagua Diez, Fidel [1 ]
Vasu, Amrutha Chikkanayakanahalli [2 ]
Suarez Touceda, Diego [1 ]
Sierra Camara, Jose Maria [3 ]
机构
[1] Univ Carlos III Madrid, Evalues Lab IT Secur Evaluat, Madrid, Spain
[2] Northeastern Univ, Boston, MA 02115 USA
[3] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
关键词
access control; graph databases; security policies; XACML;
D O I
10.1109/MITP.2017.4241465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XACML policies can be presented in a graph data structure, but while these solutions increase performance, they also drastically decrease functionality. To address this, the authors' approach models and stores XACML policies in a graph database.
引用
收藏
页码:52 / 57
页数:6
相关论文
共 50 条
  • [1] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies
    Pardal, Miguel L.
    Harrison, Mark
    Sarma, Sanjay
    Marques, Jose Alves
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [2] XACSim: a new tool for measuring similarity of XACML security policies
    Katebi, Zahra
    Nassiri, Mohammad
    Rezvani, Mohsen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3957 - 3972
  • [3] A Formal Approach to Automatic Testing of Security Policies Specified in XACML
    Aouadi, Mohamed H. E.
    Toumi, Khalifa
    Cavalli, Ana
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
  • [4] XACSim: a new tool for measuring similarity of XACML security policies
    Zahra Katebi
    Mohammad Nassiri
    Mohsen Rezvani
    Cluster Computing, 2023, 26 : 3957 - 3972
  • [5] Directed Acyclic Graph Modeling of Security Policies for Firewall Testing
    Tuglular, T.
    Kaya, Oe.
    Muftuoglu, C. A.
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 393 - 398
  • [6] Using OWL Reasoning for Evaluating XACML Policies
    Marfia, Fabio
    Neri, Mario Arrigoni
    Pellegrini, Filippo
    Colombetti, Marco
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2015, 2016, 585 : 343 - 363
  • [7] Formal analysis of XACML policies using SMT
    Turkmen, Fatih
    den Hartog, Jerry
    Ranise, Silvio
    Zannone, Nicola
    COMPUTERS & SECURITY, 2017, 66 : 185 - 203
  • [8] An implementation of a privacy enforcement scheme based on the Java']Java Security Framework using XACML policies
    Scheffler, Thomas
    Geiss, Stefan
    Schnor, Bettina
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 157 - 171
  • [9] Security Policies for Securing Cloud Databases
    Buckley, Ingrid A.
    Wu, Fan
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (06) : 33 - 36
  • [10] A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
    Peters, Jan
    Rieke, Roland
    Rochaeli, Taufiq
    Steinemann, Bjoern
    Wolf, Ruben
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 168 (SPEC. ISS.) : 143 - 157