Enforcing Access Control Over Data Streams

被引:0
|
作者
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
Tan, Kian Lee
机构
[1] Univ Insubria, DICOM, Varese, Italy
关键词
Data stream; Security; Access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based access control model proposed by us in [5]. We design a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified access control policies. We further develop an access control mechanism to enforce the access control policies based oil these operators. We show that our method is secure according to the specified policies.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 50 条
  • [21] Self-Enforcing Access Control for Encrypted RDF
    Fernandez, Javier D.
    Kirrane, Sabrina
    Polleres, Axel
    Steyskal, Simon
    SEMANTIC WEB ( ESWC 2017), PT I, 2017, 10249 : 607 - 622
  • [22] Modeling and Enforcing Access Control Policies for Smart Contracts
    Toberg, Jan-Philipp
    Schiffl, Jonas
    Reiche, Frederik
    Beckert, Bernhard
    Heinrich, Robert
    Reussner, Ralf
    2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 38 - 47
  • [23] Enforcing legal ownership rights by an access control system
    Born, E
    COMPUTERS & SECURITY, 1996, 15 (03) : 212 - 226
  • [24] A Web Service Architecture for Enforcing Access Control Policies
    Ardagna, Claudio Agostino
    Damiani, Ernesto
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 47 - 62
  • [25] Logic-based approach for enforcing access control
    Bertino, Elisa
    Buccafurri, Francesco
    Ferrari, Elena
    Rullo, Pasquale
    Journal of Computer Security, 2000, 8 (02) : 109 - 139
  • [26] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
  • [27] Decentralized data access control over consortium blockchains
    Chen, Yaoliang
    Chen, Shi
    Liang, Jiao
    Feagan, Lance Warren
    Han, Weili
    Huang, Sheng
    Wang, X. Sean
    INFORMATION SYSTEMS, 2020, 94
  • [28] Partition Access of Data Streams (PADS)
    Kuthadi, Venu Madhav
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 69 - 72
  • [29] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +
  • [30] Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies
    Fleming, Charles
    Peterson, Peter
    Kline, Erik
    Reiher, Peter
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,