A relational database integrity framework for access control policies

被引:0
|
作者
Romuald Thion
Stéphane Coulondre
机构
[1] Université de Lyon,
[2] Université de Lyon,undefined
来源
Journal of Intelligent Information Systems | 2012年 / 38卷
关键词
Integrity model; Dependencies; Authorization; Access control; Inference;
D O I
暂无
中图分类号
学科分类号
摘要
Access control is one of the most common and versatile mechanisms used for information systems security enforcement. An access control model formally describes how to decide whether an access request should be granted or denied. Since the role-based access control initiative has been proposed in the 90s, several access control models have been studied in the literature. An access control policy is an instance of a model. It defines the set of basic facts used in the decision process. Policies must satisfy a set of constraints defined in the model, which reflect some high level organization requirements. First-order logic has been advocated for some time as a suitable framework for access control models. Many frameworks have been proposed, focusing mainly on expressing complex access control models. However, though formally expressed, constraints are not defined in a unified language that could lead to some well-founded and generic enforcement procedures. Therefore, we make a clear distinction by proposing a logical framework focusing primarily on constraints, while keeping as much as possible a unified way of expressing constraints, policies, models, and reference monitors. This framework is closely tied to relational database integrity models. We then show how to use well-founded procedures in order to enforce and check constraints. Without requiring any rewriting previous to the inference process, these procedures provide clean and intuitive debugging traces for administrators. This approach is a step toward bridging the gap between general but hard to maintain formalisms and effective but insufficiently general ones.
引用
收藏
页码:131 / 159
页数:28
相关论文
共 50 条
  • [1] A relational database integrity framework for access control policies
    Thion, Romuald
    Coulondre, Stephane
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2012, 38 (01) : 131 - 159
  • [2] A Formal Framework for Reflective Database Access Control Policies
    Olson, Lars E.
    Gunter, Carl A.
    Madhusudan, P.
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 289 - 298
  • [3] XML Access Control: Mapping XACML Policies to Relational Database Tables
    El-Aziz, Abd El-Aziz Ahmed Abd
    Kannanl, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 532 - 539
  • [4] Access control of XML documents in relational database systems
    Tan, KL
    Lee, ML
    Wang, Y
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 185 - 191
  • [5] A framework for automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221
  • [6] Access Control Policies for Relational Databases in Data Exchange Process
    Jbali, Adel
    Sassi, Salma
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2017, PT I, 2017, 10438 : 264 - 271
  • [7] Framework for supporting distributed access control policies
    Zhou, W
    Meinel, C
    Raja, VH
    10TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2005, : 442 - 447
  • [8] Supporting multiple access control policies in database systems
    Bertino, E
    Jajodia, S
    Samarati, P
    1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 94 - 107
  • [9] Relational Database as an Ontology Framework
    Maciol, Andrzej
    NEW CHALLENGES IN COMPUTATIONAL COLLECTIVE INTELLIGENCE, 2009, 244 : 73 - 84
  • [10] Enforcing Agile Access Control Policies in Relational Databases using Views
    Papernot, Nicolas
    McDaniel, Patrick
    Walls, Robert J.
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 7 - 12