Modeling XACML Security Policies Using Graph Databases

被引:2
|
作者
Paniagua Diez, Fidel [1 ]
Vasu, Amrutha Chikkanayakanahalli [2 ]
Suarez Touceda, Diego [1 ]
Sierra Camara, Jose Maria [3 ]
机构
[1] Univ Carlos III Madrid, Evalues Lab IT Secur Evaluat, Madrid, Spain
[2] Northeastern Univ, Boston, MA 02115 USA
[3] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
关键词
access control; graph databases; security policies; XACML;
D O I
10.1109/MITP.2017.4241465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XACML policies can be presented in a graph data structure, but while these solutions increase performance, they also drastically decrease functionality. To address this, the authors' approach models and stores XACML policies in a graph database.
引用
收藏
页码:52 / 57
页数:6
相关论文
共 50 条
  • [21] Analysis of XACML policies with SMT
    Turkmen, Fatih
    Den Hartog, Jerry
    Ranise, Silvio
    Zannone, Nicola
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2015, 9036 : 115 - 134
  • [22] Challenges of Composing XACML Policies
    Stepien, Bernard
    Felty, Amy
    Matwin, Stan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
  • [23] Analysis of XACML Policies with ASP
    Ayed, Dhouha
    Lepareux, Marie-Noelle
    Martins, Cyrille
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [24] Security Enhancement in Web Services by Detecting and Correcting Anomalies in XACML Policies at Design Level
    Priyadharshini, M.
    Yowan, J.
    Baskaran, R.
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 120 - 135
  • [25] Evaluating Distributed XACML Policies
    Dhankhar, Vijayant
    Kaushik, Saket
    Wijesekera, Duminda
    Nerode, Anil
    SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 99 - 110
  • [26] Graph Modeling from Relational Databases
    Lima Filho, Silas P.
    Cavalcanti, Maria C.
    Justel, Claudia M.
    2017 XLIII LATIN AMERICAN COMPUTER CONFERENCE (CLEI), 2017,
  • [27] A Method for Modeling a Schema for Graph Databases
    Shoval, Peretz
    DIGITAL PRESENTATION AND PRESERVATION OF CULTURAL AND SCIENTIFIC HERITAGE, 2018, 8 : 99 - 104
  • [28] Improving Game Modeling for the Quoridor Game State Using Graph Databases
    Sanchez, Daniel
    Florez, Hector
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY & SYSTEMS (ICITS 2018), 2018, 721 : 333 - 342
  • [29] CANONICAL SECURITY MODELING FOR FEDERATED DATABASES
    PERNUL, G
    IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1993, 25 : 207 - 222
  • [30] Modeling contextual security policies
    Frédéric Cuppens
    Nora Cuppens-Boulahia
    International Journal of Information Security, 2008, 7 : 285 - 305