ACStream: Enforcing Access Control Over Data Streams

被引:0
|
作者
Cao, Jianneng [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
Tan, Kian-Lee [1 ]
机构
[1] Natl Univ Singapore, Singapore 117548, Singapore
[2] Univ Insubria, DICOM, Varese, Italy
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this demo proposal, we illustrate ACStream, a system built on top of StreamBase [1], to specify and enforce access control policies over data streams. ACStream supports a very flexible role-based access control model specifically designed to protect against unauthorized access to streaming data. The core component of ACStream is a query rewriting mechanism that, by exploiting a set of secure operators proposed by us in [2], rewrites a user query in such a way that it does not violate the specified access control policies during its execution. The demo will show how policies modelling a variety of access control requirements can be easily specified and enforced using ACStream.
引用
收藏
页码:1495 / +
页数:2
相关论文
共 50 条
  • [41] Efficient Key Management for Enforcing Access Control in Outsourced Scenarios
    Blundo, Carlo
    Cimato, Stelvio
    di Vimercati, Sabrina De Capitani
    De Santis, Alfredo
    Foresti, Sara
    Paraboschi, Stefano
    Samarati, Pierangela
    EMERGING CHALLENGES FOR SECURITY, PRIVACY AND TRUST: 24TH IFIP TC 11 INTERNATIONAL INFORMATION SECURITY CONFERENCE, SEC 2009, PROCEEDINGS, 2009, 297 : 364 - 375
  • [42] Enforcing Access Control in Information-Centric Edge Networking
    Wu, Danye
    Xu, Zhiwei
    Chen, Bo
    Zhang, Yujun
    Han, Zhu
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (01) : 353 - 364
  • [43] Enforcing role based access control model with multimedia signatures
    Al Bouna, Bechara
    Chbeir, Richard
    Marrara, Stefania
    JOURNAL OF SYSTEMS ARCHITECTURE, 2009, 55 (04) : 264 - 274
  • [44] Enforcing Mandatory Access Control in Commodity OS to Disable Malware
    Shan, Zhiyong
    Wang, Xin
    Chiueh, Tzi-cker
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (04) : 541 - 555
  • [45] Enforcing Separation of Duty in Attribute Based Access Control Systems
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 61 - 78
  • [46] Keyword Search With Access Control Over Encrypted Cloud Data
    Shen, Zhirong
    Shu, Jiwu
    Xue, Wei
    IEEE SENSORS JOURNAL, 2017, 17 (03) : 858 - 868
  • [47] Efficient authentication and access control of scalable multimedia streams over packet-lossy networks
    Deng, Robert H.
    Ding, Xuhua
    Lo, Swee-Won
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (03) : 611 - 625
  • [48] Calder: Enabling grid access to data streams
    Vijayakumar, N
    Liu, Y
    Plale, B
    14th IEEE International Symposium on High Performance Distributed Computing, Proceedings, 2005, : 283 - 284
  • [49] Continuous queries over data streams
    Babu, S
    Widom, J
    SIGMOD RECORD, 2001, 30 (03) : 109 - 120
  • [50] Window specification over data streams
    Patroumpas, Kostas
    Sellis, Timos
    CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2006, 2006, 4254 : 445 - 464