Database and Application Security XV 2002
DOI: 10.1007/978-0-387-35587-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Administering Permissions for Distributed Data: Factoring and Automated Inference

Abstract: We extend SQL's grant/revoke model to handle all administration of permissions in a distributed database. The key idea is to "factor" permissions into simpler decisions that can be administered separately, and for which we can devise sound inference rules. The model enables us to simplify administration via separation of concerns (between technical DBAs and domain experts), and to justify fully automated inference for some permission factors. We show how this approach would coexist with current practices based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…For access control systems based on the Bell-LaPadula (BLP) model [4,3], SAAMBLP [8] uses the relationships between subjects and objects of previous responses to infer approximate responses. Other work [16,20,21] uses the relationships between (database) objects to infer new authorizations. In contrast, SAAMRBAC caches information derived from primary responses in order to infer relationships between sets of roles and the permissions assigned to those roles, thereby enabling the computation of approximate responses.…”
Section: Related Workmentioning
confidence: 99%
“…For access control systems based on the Bell-LaPadula (BLP) model [4,3], SAAMBLP [8] uses the relationships between subjects and objects of previous responses to infer approximate responses. Other work [16,20,21] uses the relationships between (database) objects to infer new authorizations. In contrast, SAAMRBAC caches information derived from primary responses in order to infer relationships between sets of roles and the permissions assigned to those roles, thereby enabling the computation of approximate responses.…”
Section: Related Workmentioning
confidence: 99%
“…The use of authorization inference as the basis for security in data warehouses is also proposed by Rosenthal et al [24,22,23]. In their model, a query Q is inferred to be authorized if there is an equivalent query Q which uses only authorized views; this is identical to our model of unconditional validity.…”
Section: Related Workmentioning
confidence: 87%
“…We point out its drawbacks, and then propose our alternative model, the Non-Truman model, which avoids these drawbacks (Section 4). Authorization transparent models have been previously proposed by Motro [20] and by Rosenthal et al [24,22,23]. Our model differs from these in several respects; we outline the differences in Section 7.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations