Tuple-Based Access Control: a Provenance-Based Information Flow Control for Relational Data

被引:0
|
作者
Thion, Romuald [1 ]
Lesueur, Francois [2 ]
Talbi, Meriam [2 ]
机构
[1] Univ Lyon 1, CNRS LIRIS, UMR5205, F-69622 Villeurbanne, France
[2] INSA Lyon, CNRS LIRIS, UMR5205, F-69621 Villeurbanne, France
来源
30TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, VOLS I AND II | 2015年
关键词
access control; relational databases; provenance; information flow; personal data server;
D O I
10.1145/2695664.2695758
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes a flexible control framework for relational personal data that enforces data originators' dissemination policies. Inspired by the sticky policy paradigm and mandatory access control, dissemination policies are linked with atomic data and are combined when different pieces of data are merged. The background setting of relational provenance guarantees that the policy combining operations behave accordingly to the operations carried out on the data. We show that the framework can capture a large class of policies similar to those of lattice-based access control models and that it can be integrated seamlessly into relational database management systems. In particular, we define a path oriented dissemination control model where policies define authorized chains of transfers between databases. Promising ongoing research work include the generalization of the theoretical framework to more expressive query languages including aggregation and difference operators as well as experiments on secure tokens.
引用
收藏
页码:2165 / 2170
页数:6
相关论文
共 50 条
  • [31] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
  • [32] A Boundary-based Access Control Model for Sensitive Information
    Liu, Xiaobing
    Bai, Zhaoyang
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III: UNLOCKING THE FULL POTENTIAL OF GLOBAL TECHNOLOGY, 2008, : 465 - 471
  • [33] Annotation-based access control for collaborative information spaces
    Nasirifard, Peyman
    Peristeras, Vassilios
    Decker, Stefan
    COMPUTERS IN HUMAN BEHAVIOR, 2011, 27 (04) : 1352 - 1364
  • [34] A Boundary-based Access Control Model for Sensitive Information
    Mu Xiaojun
    2009 INTERNATIONAL FORUM ON INFORMATION TECHNOLOGY AND APPLICATIONS, VOL 3, PROCEEDINGS, 2009, : 685 - 689
  • [35] Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information
    Yang, Yang
    Chen, Yanjiao
    Chen, Fei
    Chen, Jing
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 10434 - 10445
  • [36] Information Flow Oriented Access Control for Integrity in Communication Network Environment
    Li, Weinan
    Feng, Hui
    Shi, Wenchang
    INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 334 - +
  • [37] Dependent Type Theory for Verification of Information Flow and Access Control Policies
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
  • [38] Access Control Mechanism of Wireless Gateway Based on Open Flow
    Peng, Rong
    Ding, Lei
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [39] Do Provenance-Based Classification Schemes Have a Role in Libraries and Information Centres? The Case of Classifying Government Publications
    Lambert, Frank
    CATALOGING & CLASSIFICATION QUARTERLY, 2011, 49 (03) : 208 - 222
  • [40] Typing access control and secure information flow in sessions
    Capecchi, Sara
    Castellani, Ilaria
    Dezani-Ciancaglini, Mariangiola
    INFORMATION AND COMPUTATION, 2014, 238 : 68 - 105