Inheriting Access Control Rules from Large Relational Databases to Materialized Views Automatically

被引:0
|
作者
Cuzzocrea, Alfredo [1 ]
Hacid, Mohand-Said [2 ]
Grillo, Nicola [3 ]
机构
[1] Univ Calabria, ICAR CNR, I-87030 Commenda Di Rende, Italy
[2] Univ Lyon 1, LIRIS, Villeurbanne, France
[3] Univ Calabria, DEIS Dept, I-87030 Commenda Di Rende, Italy
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel approach for automatically inheriting access control rules form large relational databases to materialized views defined on such databases is proposed in this paper, along with main algorithm VSP-Bucket. Our proposal introduces a number of research innovations, ranging from a novel Datalog-based syntax, and related semantics, for modeling and expressing access control rules over relational databases to algorithm VSP-Bucket itself, which is a meaningifully adaptation of a well-know view-based query re-writing algorithm for database optimization purposes. A preliminary experimental evaluation and analysis of performance of algorithm VSP-Bucket completes our foremost analytical contribution made in this research.
引用
收藏
页码:426 / +
页数:3
相关论文
共 44 条
  • [1] Effectively and Efficiently Selecting Access Control Rules on Materialized Views over Relational Databases
    Cuzzocrea, Alfredo
    Hacid, Mohand-Said
    Grillo, Nicola
    [J]. PROCEEDINGS OF THE FOURTEENTH INTERNATIONAL DATABASE ENGINEERING & APPLICATIONS SYMPOSIUM (IDEAS '10), 2010, : 225 - 235
  • [2] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [3] A Comparative Analysis of Materialized Views Selection and Concurrency Control Mechanisms in NoSQL Databases
    Tapdiya, Ashish
    Xue, Yuan
    Fabbri, Daniel
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 384 - 388
  • [4] DYNAMIC ACCESS-CONTROL FOR RELATIONAL VIEWS
    ROUSSOPOULOS, N
    BADER, C
    [J]. INFORMATION SYSTEMS, 1985, 10 (03) : 361 - 369
  • [5] Semi-Automatically Building Ontologies from Relational Databases
    Yang, Shihan
    Zheng, Ying
    Yang, Xuehui
    [J]. PROCEEDINGS 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, (ICCSIT 2010), VOL 1, 2010, : 150 - 154
  • [6] DATA CONVERSION RULES FROM NETWORK TO RELATIONAL DATABASES
    FONG, J
    BLOOR, C
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 1994, 36 (03) : 141 - 153
  • [7] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +
  • [8] Access Control Policies for Relational Databases in Data Exchange Process
    Jbali, Adel
    Sassi, Salma
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT I, 2017, 10438 : 264 - 271
  • [9] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    [J]. Cluster Computing, 2017, 20 : 2669 - 2685
  • [10] On the Temporal Access Control Implementation at the Logical Level of Relational Databases
    Zhezhnych, Pavlo
    Burak, Teodor
    Chyrka, Oleg
    [J]. 2016 XITH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), 2016, : 84 - 87