Enforcing Access Control Over Data Streams

被引:0
|
作者
Carminati, Barbara [1 ]
Ferrari, Elena [1 ]
Tan, Kian Lee
机构
[1] Univ Insubria, DICOM, Varese, Italy
关键词
Data stream; Security; Access control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based access control model proposed by us in [5]. We design a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified access control policies. We further develop an access control mechanism to enforce the access control policies based oil these operators. We show that our method is secure according to the specified policies.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 50 条
  • [41] Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
    Blundo, Carlo
    Cimato, Stelvio
    di Vimercati, Sabrina De Capitani
    De Santis, Alfredo
    Foresti, Sara
    Paraboschi, Stefano
    Samarati, Pierangela
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 364 - 375
  • [42] Enforcing Access Control in Information-Centric Edge Networking
    Wu, Danye
    Xu, Zhiwei
    Chen, Bo
    Zhang, Yujun
    Han, Zhu
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 353 - 364
  • [43] Enforcing role based access control model with multimedia signatures
    Al Bouna, Bechara
    Chbeir, Richard
    Marrara, Stefania
    JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) : 264 - 274
  • [44] Enforcing Mandatory Access Control in Commodity OS to Disable Malware
    Shan, Zhiyong
    Wang, Xin
    Chiueh, Tzi-cker
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 541 - 555
  • [45] Enforcing Separation of Duty in Attribute Based Access Control Systems
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 61 - 78
  • [46] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [47] Efficient authentication and access control of scalable multimedia streams over packet-lossy networks
    Deng, Robert H.
    Ding, Xuhua
    Lo, Swee-Won
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 611 - 625
  • [48] Calder: Enabling grid access to data streams
    Vijayakumar, N
    Liu, Y
    Plale, B
    14th IEEE International Symposium on High Performance Distributed Computing, Proceedings, 2005, : 283 - 284
  • [49] Continuous queries over data streams
    Babu, S
    Widom, J
    SIGMOD RECORD, 2001, 30 (03) : 109 - 120
  • [50] Window specification over data streams
    Patroumpas, Kostas
    Sellis, Timos
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 445 - 464