Modeling XACML Security Policies Using Graph Databases

被引:2
|
作者
Paniagua Diez, Fidel [1 ]
Vasu, Amrutha Chikkanayakanahalli [2 ]
Suarez Touceda, Diego [1 ]
Sierra Camara, Jose Maria [3 ]
机构
[1] Univ Carlos III Madrid, Evalues Lab IT Secur Evaluat, Madrid, Spain
[2] Northeastern Univ, Boston, MA 02115 USA
[3] Northeastern Univ, Coll Comp & Informat Sci, Boston, MA 02115 USA
关键词
access control; graph databases; security policies; XACML;
D O I
10.1109/MITP.2017.4241465
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
XACML policies can be presented in a graph data structure, but while these solutions increase performance, they also drastically decrease functionality. To address this, the authors' approach models and stores XACML policies in a graph database.
引用
收藏
页码:52 / 57
页数:6
相关论文
共 50 条
  • [41] Modeling and Enforcing Integrity Constraints on Graph Databases
    Reina, Fabio
    Huf, Alexis
    Presser, Daniel
    Siqueira, Frank
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT I, 2020, 12391 : 269 - 284
  • [42] Multi-Domain Modeling with Graph Databases
    Hackl, Jennifer
    Gumpinger, Thomas
    Rueegg, Ulf
    Krause, Dieter
    REDUCING RISK IN INNOVATION, 2013, : 47 - 54
  • [43] Approaches for Testing and Evaluation of XACML Policies
    Alsmadi, Izzat M.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 101 - 111
  • [44] A Security Model for Access Control in Graph-Oriented Databases
    Morgado, Claudia
    Baioco, Gisele Busichia
    Basso, Tania
    Moraes, Regina
    2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2018), 2018, : 135 - 142
  • [45] On The Modeling. of Bell-LaPadula Security Policies Using RBAC
    Zhao, Gansen
    Chadwick, David W.
    17TH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURES FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2008, : 257 - 262
  • [46] A study on time models in graph databases for security log analysis
    Hofer, Daniel
    Jager, Markus
    Mohamed, Aya
    Kung, Josef
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2021, 17 (05) : 427 - 448
  • [47] A rewriting system for the assessment of XACML policies relationship
    Mejri, Mohamed
    Yahyaoui, Hamdi
    Mourad, Azzam
    Chehab, Mohamad
    COMPUTERS & SECURITY, 2020, 97
  • [48] Automated Strong Mutation Testing of XACML Policies
    Xu, Dianxiang
    Shrestha, Roshan
    Shen, Ning
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 105 - 116
  • [49] Using Functional Dependencies in Conversion of Relational Databases to Graph Databases
    Megid, Youmna A.
    El-Tazi, Neamat
    Fahmy, Aly
    DATABASE AND EXPERT SYSTEMS APPLICATIONS (DEXA 2018), PT II, 2018, 11030 : 350 - 357
  • [50] Implementing ACL-based Policies in XACML
    Karjoth, Guenter
    Schade, Andreas
    Van Herreweghen, Els
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 183 - 192