ACStream: Enforcing Access Control Over Data Streams

被引:0
|
作者
Cao, Jianneng [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
Tan, Kian-Lee [1 ]
机构
[1] Natl Univ Singapore, Singapore 117548, Singapore
[2] Univ Insubria, DICOM, Varese, Italy
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this demo proposal, we illustrate ACStream, a system built on top of StreamBase [1], to specify and enforce access control policies over data streams. ACStream supports a very flexible role-based access control model specifically designed to protect against unauthorized access to streaming data. The core component of ACStream is a query rewriting mechanism that, by exploiting a set of secure operators proposed by us in [2], rewrites a user query in such a way that it does not violate the specified access control policies during its execution. The demo will show how policies modelling a variety of access control requirements can be easily specified and enforced using ACStream.
引用
收藏
页码:1495 / +
页数:2
相关论文
共 50 条
  • [1] Enforcing Access Control Over Data Streams
    Carminati, Barbara
    Ferrari, Elena
    Tan, Kian Lee
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 21 - 30
  • [2] A Framework to Enforce Access Control over Data Streams
    Carminati, Barbara
    Dicom, Elena Ferrari
    Cao, Jianneng
    Tan, Kian Lee
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [3] Enforcing Access Control Policies over Data Stored on Untrusted Server
    Soltani, Naeimeh
    Jalili, Rasool
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 119 - 124
  • [4] Specifying access control policies on data streams
    Carminati, Barbara
    Ferraris, Elena
    Tang, Kian Lee
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
  • [5] A security punctuation framework for enforcing access control on streaming data
    Nehme, Rimma V.
    Rundensteiner, Elke A.
    Bertino, Elisa
    2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 406 - +
  • [6] A Privacy Enforcing Framework for Data Streams on the Edge
    Sedlak, Boris
    Murturi, Ilir
    Donta, Praveen Kumar
    Dustdar, Schahram
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2024, 12 (03) : 852 - 863
  • [7] An Architecture for Enforcing End-to-End Access Control Over Web Applications
    Hicks, Boniface
    Rueda, Sandra
    King, Dave
    Moyer, Thomas
    Schiffman, Joshua
    Sreenivasan, Yogesh
    McDaniel, Patrick
    Jaeger, Trent
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 163 - 172
  • [8] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351
  • [9] Access Control over Uncertain Data
    Rastogi, Vibhor
    Suciu, Dan
    Welbourne, Evan
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2008, 1 (01): : 821 - 832
  • [10] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687