Mandatory and Location-Aware Access Control for Relational Databases

被引:0
作者
Decker, Michael [1 ]
机构
[1] Univ Karlsruhe TH, Inst AIFB, D-76128 Karlsruhe, Germany
来源
COMMUNICATIONS INFRASTRUCTURE: SYSTEMS AND APPLICATIONS IN EUROPE | 2009年 / 16卷
关键词
Location-based Services; Database Management Systems (DBMS); Mandatory Access Control (MAC); Mobile Computing; Security Models;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is concerned with determining which operations a particular user is allowed to perform on a particular electronic resource. For example, an access control decision could say that user Alice is allowed to perform the operation read (but not write) on the resource research report. With conventional access control this decision is based on the user's identity whereas the basic idea of Location-Aware Access Control (LAAC) is to evaluate also a user's current location when making the decision if a particular request should be granted or denied. LAAC is an interesting approach for mobile information systems because these systems are exposed to specific security threads like the loss of a device. Some data models for LAAC can be found in literature, but almost all of them are based on RBAC and none of them is designed especially for Database Management Systems (DBMS). In this paper we therefore propose a LAAC-approach for DMBS and describe a prototypical implementation of that approach that is based on database triggers.
引用
收藏
页码:217 / 228
页数:12
相关论文
共 18 条
[1]  
Bell D. E., 1976, MTR2997 MITRE CORP
[2]  
BIBA KJ, 1976, MTR3153 MITRE CORP
[3]   Managing workflow authorization constraints through active database technology [J].
Casati, F ;
Castano, S ;
Fugini, MG .
INFORMATION SYSTEMS FRONTIERS, 2001, 3 (03) :319-338
[4]  
Castano S., 1994, Database security
[5]  
Cho Y.S., 2006, P 3 ANN INT C MOB UB, P1
[6]  
Damiani M. L., 2007, International Journal of Information and Computer Security, V1, P5, DOI 10.1504/IJICS.2007.012243
[7]  
Decker M., 2009, P P INFORM, P75
[8]  
Decker M., 2008, P INT C MOB BUS ICMB
[9]  
Decker M, 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS, P109
[10]  
Elmasri R., 2004, Fundamentals of database systems, V4th