Access Control Policy Translation and Verification within Heterogeneous Data Federations

被引:1
|
作者
Leighton, Gregory [1 ]
Barbosa, Denilson [1 ]
机构
[1] Univ Alberta, Dept Comp Sci, Edmonton, AB, Canada
来源
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2010年
关键词
Access Control; Relational Databases; XML; XACML;
D O I
10.1145/1809842.1809871
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this paper, we first consider the problem of translating existing access control policies defined over source databases in a manner that allows the original semantics to be observed, while becoming applicable across the entire data federation. We show that such a translation is always possible, and provide an algorithm for automating the translation. We then show that verifying that a translated policy obeys the semantics of the original access control policy defined over a source database is intractable, even under restrictive scenarios. Finally, we describe a practical algorithmic framework for translating relational access control policies into their XML equivalent, expressed in the eXtensible Access Control Markup Language.
引用
收藏
页码:173 / 182
页数:10
相关论文
共 50 条
  • [21] HACS: Access Control for Streaming Data Across Heterogeneous Communication Models
    Gopalakrishnan, Atul Anand
    Victor, Ashish Christopher
    Karanji, Deepika
    Sivakumar, Umashankar
    Nambiar, Seema
    Kalambur, Subramaniam
    2021 IEEE WORLD AI IOT CONGRESS (AIIOT), 2021, : 109 - 114
  • [22] Specification and adaptive verification of access control policy for cyber-physical-social spaces
    Cao, Yan
    Ping, Yuan
    Tao, Shaohua
    Chen, YongGang
    Zhu, YanXia
    COMPUTERS & SECURITY, 2022, 114
  • [23] LIVE: Lightweight Integrity Verification and Content Access Control for Named Data Networking
    Li, Qi
    Zhang, Xinwen
    Zheng, Qingji
    Sandhu, Ravi
    Fu, Xiaoming
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 308 - 320
  • [24] A Trust-aware Access Control Policy for Cloud Data Protection
    Tang, Xiaoyong
    Li, Jinwei
    Liao, Guiping
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 40 - 44
  • [25] Fine-grained filtering to provide access control for data providing services within collaborative environments
    Brown, Kevin
    Hayes, Michael
    Allison, David
    Capretz, Miriam A. M.
    Sazio, Margaret
    Mann, Rupinder
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (06) : 1445 - 1466
  • [26] CSchema: A downgrading policy language for XML access control
    Liu, Dong-Xi
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 44 - 53
  • [27] Measurement and Prediction of Access Control Policy Evaluation Performance
    Butler, Bernard
    Jennings, Brendan
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2015, 12 (04): : 526 - 539
  • [28] CSchema: A Downgrading Policy Language for XML Access Control
    Dong-Xi Liu
    Journal of Computer Science and Technology, 2007, 22 : 44 - 53
  • [29] Access Control and Query Verification for Untrusted Databases
    Jain, Rohit
    Prabhakar, Sunil
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
  • [30] A Data Classification Method for Inconsistency and Incompleteness Detection in Access Control Policy Sets
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (01) : 91 - 113