An Intermediate Representation for Rewriting Cypher Queries

被引:0
作者
Hofer, Daniel [1 ,2 ]
Mohamed, Aya [1 ,2 ]
Nadschlaeger, Stefan [1 ]
Auer, Dagmar [1 ,2 ]
机构
[1] Johannes Kepler Univ JKU Linz, Inst Applicat Oriented Knowledge Proc FAW, Linz, Austria
[2] Johannes Kepler Univ JKU Linz, Linz Inst Technol LIT, LIT Secure & Correct Syst Lab, Linz, Austria
来源
DATABASE AND EXPERT SYSTEMS APPLICATIONS - DEXA 2023 WORKSHOPS | 2023年 / 1872卷
关键词
Abstract Syntax Tree (AST); Query Rewriting; Cypher;
D O I
10.1007/978-3-031-39689-2_9
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Some of the current graph database systems provide built-in authorization and access control features. However, many authorization requirements demand for more sophisticated access control such as fine-grained, attribute-based access control (ABAC). Therefore, we decided for a query rewriting approach to enforce these authorizations. We propose an intermediate representation for the semantics of the query. Based on the Cypher grammar, we build an abstract syntax tree (AST) of the query to be extended (i.e., rewritten). We consider a universal class hierarchy for our AST nodes based on the composite pattern, while the semantics of the nodes is introduced via data components. This provides flexibility with respect to the supported kinds of permissions and complexity of the Cypher queries. Our concept and prototypical implementation rely on ANTLR (ANother Tool for Language Recognition), which generates a parser based on the Cypher grammar to create and traverse concrete syntax trees.
引用
收藏
页码:86 / 90
页数:5
相关论文
共 9 条
  • [1] Automating Abstract Syntax Tree construction for Context Free Grammars
    Arusoaie, Andrei
    Vicol, Daniel Ionut
    [J]. 14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, : 152 - 159
  • [2] Uniform abstract syntax trees
    Clark, C
    [J]. ACM SIGPLAN NOTICES, 2000, 35 (02) : 11 - 16
  • [3] Extending Authorization Capabilities of Object Relational/Graph Mappers by Request Manipulation
    Hofer, Daniel
    Nadschlaeger, Stefan
    Mohamed, Aya
    Kueng, Josef
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2022, PT II, 2022, 13427 : 71 - 83
  • [4] Authorization and Access Control for Different Database Models: Requirements and Current State of the Art
    Mohamed, Aya
    Auer, Dagmar
    Hofer, Daniel
    Kueng, Josef
    [J]. FUTURE DATA AND SECURITY ENGINEERING. BIG DATA, SECURITY AND PRIVACY, SMART CITY AND INDUSTRY 4.0 APPLICATIONS, FDSE 2022, 2022, 1688 : 225 - 239
  • [5] Neo4j Inc, openCypher
  • [6] Composite design patterns
    Riehle, D
    [J]. ACM SIGPLAN NOTICES, 1997, 32 (10) : 218 - 228
  • [7] Security&privacy issues and challenges in NoSQL databases
    Sicari, Sabrina
    Rizzardi, Alessandra
    Coen-Porisini, Alberto
    [J]. COMPUTER NETWORKS, 2022, 206
  • [8] Generator of efficient strongly typed abstract syntax trees in Java']Java
    van den Brand, M
    Moreau, PE
    Vinju, J
    [J]. IEE PROCEEDINGS-SOFTWARE, 2005, 152 (02): : 70 - 78
  • [9] Wadler Philip., 1998, DISCUSSION JAVA GENE