2016 IEEE Second International Conference on Big Data Computing Service and Applications (BigDataService) 2016
DOI: 10.1109/bigdataservice.2016.35
|View full text |Cite
|
Sign up to set email alerts
|

Attribute Based Access Control for Big Data Applications by Query Modification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…Another language-based ABAC approach has been proposed in Longstaff and Noble (2016), with the goal to be usable with traditional data management systems, Mapreduce systems, as well as NoSQL datastores. The work proposes a query rewriting approach that targets user transactions specified with an SQL-like language.…”
Section: Platform Independent Approachesmentioning
confidence: 99%
“…Another language-based ABAC approach has been proposed in Longstaff and Noble (2016), with the goal to be usable with traditional data management systems, Mapreduce systems, as well as NoSQL datastores. The work proposes a query rewriting approach that targets user transactions specified with an SQL-like language.…”
Section: Platform Independent Approachesmentioning
confidence: 99%
“…In this section we summarize further aspects of the TCM2 authorization model. More detailed expositions can be found in [9,10].…”
Section: Tcm2 Oveerviewmentioning
confidence: 99%
“…XI. RELATED WORK More details of TCM2 authorisation model and its formal specification can be found in [8,9,18]. These publications give a detailed comparison with ABAC and RBAC research literature.…”
Section: B Problem Transaction Querymentioning
confidence: 99%
See 1 more Smart Citation
“…The access control mechanisms are used to enable the end-users for controlling the access of their own data. Among different access control mechanisms, Attribute-based Access Control (ABAC) [3] and Role Based Access Control [4] are emerging as a promising paradigm. Generally, ABAC is referred as an access control protocol wherein the access rights are allowed to users through the utilization of policies which combine attributes together.…”
Section: Introductionmentioning
confidence: 99%