Access Control Policy Translation and Verification within Heterogeneous Data Federations

被引:1
|
作者
Leighton, Gregory [1 ]
Barbosa, Denilson [1 ]
机构
[1] Univ Alberta, Dept Comp Sci, Edmonton, AB, Canada
来源
SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2010年
关键词
Access Control; Relational Databases; XML; XACML;
D O I
10.1145/1809842.1809871
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this paper, we first consider the problem of translating existing access control policies defined over source databases in a manner that allows the original semantics to be observed, while becoming applicable across the entire data federation. We show that such a translation is always possible, and provide an algorithm for automating the translation. We then show that verifying that a translated policy obeys the semantics of the original access control policy defined over a source database is intractable, even under restrictive scenarios. Finally, we describe a practical algorithmic framework for translating relational access control policies into their XML equivalent, expressed in the eXtensible Access Control Markup Language.
引用
收藏
页码:173 / 182
页数:10
相关论文
共 50 条
  • [41] Detecting conflict of heterogeneous access control policies
    Yu, Mingjie
    Li, Fenghua
    Yu, Nenghai
    Wang, Xiao
    Guo, Yunchuan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 664 - 679
  • [42] Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS
    Patil, Suraj Krishna
    Sagare, Sandipkumar Chandrakant
    Shelar, Alankar Shantaram
    INTERNATIONAL JOURNAL OF SOFTWARE INNOVATION, 2020, 8 (01) : 82 - 91
  • [43] COGNITIVE ACCESS CONTROL IN COGNITIVE HETEROGENEOUS NETWORKS
    Gu, Chen
    Zhang, Yong
    Song, Mei
    Wang, Xiaojun
    PROCEEDINGS OF 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS TECHNOLOGY AND APPLICATIONS, 2009, : 707 - 711
  • [44] Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems
    Mell, Peter
    Shook, James M.
    Gavrila, Serban
    MIST'16: PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS, 2016, : 13 - 21
  • [45] Distributed clinical data sharing via dynamic access-control policy transformation
    Rezaeibagha, Fatemeh
    Mu, Yi
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2016, 89 : 25 - 31
  • [46] Multi-attribute-Based Access Control Policy for Supply Chain Data Service
    Zou Junwei
    Lan Jiewei
    Wang Xiaoke
    Luo Hong
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (06) : 1283 - 1290
  • [47] Multi-attribute-Based Access Control Policy for Supply Chain Data Service
    ZOU Junwei
    LAN Jiewei
    WANG Xiaoke
    LUO Hong
    Chinese Journal of Electronics, 2018, 27 (06) : 1283 - 1290
  • [48] Access Control for Software-Defined Heterogeneous Wireless Access Network
    Xu, Fangmin
    Qiu, Chao
    Guo, Andong
    Zhao, Chenglin
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 520 - 524
  • [49] Enabling Verification and Conformance Testing for Access Control Model
    Hu, Hongxin
    Ahn, Gail-Joon
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 195 - 204
  • [50] UML specification of access control policies and their formal verification
    Koch M.
    Parisi-Presicce F.
    Software & Systems Modeling, 2006, 5 (4) : 429 - 447