ACStream: Enforcing Access Control Over Data Streams

被引:0
|
作者
Cao, Jianneng [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
Tan, Kian-Lee [1 ]
机构
[1] Natl Univ Singapore, Singapore 117548, Singapore
[2] Univ Insubria, DICOM, Varese, Italy
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this demo proposal, we illustrate ACStream, a system built on top of StreamBase [1], to specify and enforce access control policies over data streams. ACStream supports a very flexible role-based access control model specifically designed to protect against unauthorized access to streaming data. The core component of ACStream is a query rewriting mechanism that, by exploiting a set of secure operators proposed by us in [2], rewrites a user query in such a way that it does not violate the specified access control policies during its execution. The demo will show how policies modelling a variety of access control requirements can be easily specified and enforced using ACStream.
引用
收藏
页码:1495 / +
页数:2
相关论文
共 50 条
  • [21] Self-Enforcing Access Control for Encrypted RDF
    Fernandez, Javier D.
    Kirrane, Sabrina
    Polleres, Axel
    Steyskal, Simon
    SEMANTIC WEB ( ESWC 2017), PT I, 2017, 10249 : 607 - 622
  • [22] Modeling and Enforcing Access Control Policies for Smart Contracts
    Toberg, Jan-Philipp
    Schiffl, Jonas
    Reiche, Frederik
    Beckert, Bernhard
    Heinrich, Robert
    Reussner, Ralf
    2022 FOURTH IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPS 2022), 2022, : 38 - 47
  • [23] Enforcing legal ownership rights by an access control system
    Born, E
    COMPUTERS & SECURITY, 1996, 15 (03) : 212 - 226
  • [24] A Web Service Architecture for Enforcing Access Control Policies
    Ardagna, Claudio Agostino
    Damiani, Ernesto
    di Vimercati, Sabrina De Capitani
    Samarati, Pierangela
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 142 : 47 - 62
  • [25] Logic-based approach for enforcing access control
    Bertino, Elisa
    Buccafurri, Francesco
    Ferrari, Elena
    Rullo, Pasquale
    Journal of Computer Security, 2000, 8 (02) : 109 - 139
  • [26] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
  • [27] Decentralized data access control over consortium blockchains
    Chen, Yaoliang
    Chen, Shi
    Liang, Jiao
    Feagan, Lance Warren
    Han, Weili
    Huang, Sheng
    Wang, X. Sean
    INFORMATION SYSTEMS, 2020, 94
  • [28] Partition Access of Data Streams (PADS)
    Kuthadi, Venu Madhav
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 69 - 72
  • [29] Enforcing confidentiality in relational databases by reducing inference control to, access control
    Biskup, Joachim
    Lochner, Jan-Hendrik
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 407 - +
  • [30] Data Tethers: Preventing Information Leakage by Enforcing Environmental Data Access Policies
    Fleming, Charles
    Peterson, Peter
    Kline, Erik
    Reiher, Peter
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,