Enforcing Access Control Over Data Streams

被引:0
|
作者
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
Tan, Kian Lee
机构
[1] Univ Insubria, DICOM, Varese, Italy
关键词
Data stream; Security; Access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based access control model proposed by us in [5]. We design a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified access control policies. We further develop an access control mechanism to enforce the access control policies based oil these operators. We show that our method is secure according to the specified policies.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 50 条
  • [1] ACStream: Enforcing Access Control Over Data Streams
    Cao, Jianneng
    Carminati, Barbara
    Ferrari, Elena
    Tan, Kian-Lee
    ICDE: 2009 IEEE 25TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2009, : 1495 - +
  • [2] A Framework to Enforce Access Control over Data Streams
    Carminati, Barbara
    Dicom, Elena Ferrari
    Cao, Jianneng
    Tan, Kian Lee
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [3] Enforcing Access Control Policies over Data Stored on Untrusted Server
    Soltani, Naeimeh
    Jalili, Rasool
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 119 - 124
  • [4] Specifying access control policies on data streams
    Carminati, Barbara
    Ferraris, Elena
    Tang, Kian Lee
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
  • [5] A security punctuation framework for enforcing access control on streaming data
    Nehme, Rimma V.
    Rundensteiner, Elke A.
    Bertino, Elisa
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 406 - +
  • [6] A Privacy Enforcing Framework for Data Streams on the Edge
    Sedlak, Boris
    Murturi, Ilir
    Donta, Praveen Kumar
    Dustdar, Schahram
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (03) : 852 - 863
  • [7] An Architecture for Enforcing End-to-End Access Control Over Web Applications
    Hicks, Boniface
    Rueda, Sandra
    King, Dave
    Moyer, Thomas
    Schiffman, Joshua
    Sreenivasan, Yogesh
    McDaniel, Patrick
    Jaeger, Trent
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 163 - 172
  • [8] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [9] Access Control over Uncertain Data
    Rastogi, Vibhor
    Suciu, Dan
    Welbourne, Evan
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 821 - 832
  • [10] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687