Access Control Policies for Relational Databases in Data Exchange Process

被引:0
|
作者
Jbali, Adel [1 ]
Sassi, Salma [1 ]
机构
[1] Univ Jendouba, Fac Law, Econ & Management Jendouba VPNC Lab, Jendouba, Tunisia
关键词
Access control; Data exchange; Authorization view; Database security;
D O I
10.1007/978-3-319-64468-4_20
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, many organizations rely on database systems as the key data management technology for a large variety of tasks. This wide use of such systems involved that security breaches and unauthorized disclosures threat those systems especially when the data is exchanged between several parts in a distributed system. Consequently, access control must adapt to this exchange process to maintain data privacy. In this paper, the challenge is to design an approach to deal with access control policies in a context of data exchange between relational databases. In fact, the main problem that we are dealing with is that given a set of policies attached to a source schema and a set of mapping rules to a target schema, the question is how the policies will pass from the source schema to the target schema and what are the policies that will be attached to the target schema to comply with the set of source policies. For that purpose, we propose in this paper our methodology called Policies-generation.
引用
收藏
页码:264 / 271
页数:8
相关论文
共 50 条
  • [1] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    [J]. 2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12
  • [2] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +
  • [3] A relational database integrity framework for access control policies
    Thion, Romuald
    Coulondre, Stephane
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) : 131 - 159
  • [4] A relational database integrity framework for access control policies
    Romuald Thion
    Stéphane Coulondre
    [J]. Journal of Intelligent Information Systems, 2012, 38 : 131 - 159
  • [5] On the Temporal Access Control Implementation at the Logical Level of Relational Databases
    Zhezhnych, Pavlo
    Burak, Teodor
    Chyrka, Oleg
    [J]. 2016 XITH INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE COMPUTER SCIENCES AND INFORMATION TECHNOLOGIES (CSIT), 2016, : 84 - 87
  • [6] An insider threat aware access control for cloud relational databases
    Qussai Yaseen
    Yaser Jararweh
    Brajendra Panda
    Qutaibah Althebyan
    [J]. Cluster Computing, 2017, 20 : 2669 - 2685
  • [7] An insider threat aware access control for cloud relational databases
    Yaseen, Qussai
    Jararweh, Yaser
    Panda, Brajendra
    Althebyan, Qutaibah
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (03): : 2669 - 2685
  • [9] A fine-grained access control model for relational databases
    Jie Shi
    Hong Zhu
    [J]. Journal of Zhejiang University SCIENCE C, 2010, 11 : 575 - 586
  • [10] Mandatory and Location-Aware Access Control for Relational Databases
    Decker, Michael
    [J]. COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE, 2009, 16 : 217 - 228