2010
DOI: 10.1007/s10844-010-0146-z
|View full text |Cite
|
Sign up to set email alerts
|

A relational database integrity framework for access control policies

Abstract: Access control is one of the most common and versatile mechanisms used for information systems security enforcement. An access control model formally describes how to decide whether an access request should be granted or denied. Since the rolebased access control initiative has been proposed in the 90s, several access control models have been studied in the literature. An access control policy is an instance of a model. It denes the set of basic facts used in the decision process. Policies must satisfy a set o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 33 publications
0
5
0
Order By: Relevance
“…As regards the verification of concrete policies, several research studies fit into this topic with a main goal of verifying the correctness of the implementation regarding the set of predefined constraints. The basic contributions deal with (i) checking the validity of the implemented policy in comparison to its security constraints [40] by using a finite model checker; (ii) detecting anomalies of redundancy and inconsistency in the expression of the policy [41] by utilizing the concept of graph of roles; and (iii) proposing [42] a logical framework used to set and check policy constraints in the case of relational databases. To detect possible intrusions that may threaten an access control system, the author in [43] proposed to model the policy as a graph of roles and to use algorithms of graph theory or LDAP directory schema, to detect illicit transfer of privileges.…”
Section: Verification and Validation Of Access Control Policiesmentioning
confidence: 99%
“…As regards the verification of concrete policies, several research studies fit into this topic with a main goal of verifying the correctness of the implementation regarding the set of predefined constraints. The basic contributions deal with (i) checking the validity of the implemented policy in comparison to its security constraints [40] by using a finite model checker; (ii) detecting anomalies of redundancy and inconsistency in the expression of the policy [41] by utilizing the concept of graph of roles; and (iii) proposing [42] a logical framework used to set and check policy constraints in the case of relational databases. To detect possible intrusions that may threaten an access control system, the author in [43] proposed to model the policy as a graph of roles and to use algorithms of graph theory or LDAP directory schema, to detect illicit transfer of privileges.…”
Section: Verification and Validation Of Access Control Policiesmentioning
confidence: 99%
“…Authors in [11] chose to transform the specification to the B notation using the B4Msecure tool and to analyze it with the ProB tool. Authors in [14] defined a logical framework to enforce the integrity of access control policies in relational databases. This framework focuses primarily on how to enforce and check constraints.…”
Section: Related Workmentioning
confidence: 99%
“…We define renamed users in (14) as the set of couple of users (U i , U j ); where U i is a missed user, U j is a hidden user and both users share the same permissions and roles:…”
Section: Validation Propertiesmentioning
confidence: 99%
“…Simultaneous use of different roles can lead to violations of data security. An important limitation of this risk is transferring the rules of secure data access to the database server level [22].…”
Section: Introductionmentioning
confidence: 99%