2013
DOI: 10.1007/978-3-642-29578-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Fine Grained Access Control for Relational Databases by Abstract Interpretation

Abstract: Abstract:In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various levels of abstractions according to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confidential data, while they are allowed to get partial information out of it, according to their access rights. The traditional fine grained access control (FGAC) can be seen as a special case of the OFGAC framework.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
3
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 13 publications
(12 reference statements)
1
3
0
Order By: Relevance
“…They proposed a secure and sound SAQP algorithm. Other secure and sound algorithms have been proposed since then, such as [10,17]. Our results prove the claim of Wang et al that optimal Security-Aware Query Processing is difficult.…”
Section: Security-aware Query Processingsupporting
confidence: 83%
“…They proposed a secure and sound SAQP algorithm. Other secure and sound algorithms have been proposed since then, such as [10,17]. Our results prove the claim of Wang et al that optimal Security-Aware Query Processing is difficult.…”
Section: Security-aware Query Processingsupporting
confidence: 83%
“…The set U is {u, admin} and the policy S is { ⊕,u, SELECT,T ,admin , ⊕, u, SELECT, V , admin , ⊕, u, INSERT, T , admin }. Consider the following run r, parametrized by the initial database state db, where u first inserts 27 into T and afterwards issues the SELECT query V (27). We assume there are no exceptions in r.…”
Section: Data Confidentialitymentioning
confidence: 99%
“…From the literature, we extracted the SELECT-only attacker model, where the attacker uses just SELECT commands. A number of access control mechanisms, such as [1,4,8,9,13,27,31,35,41,43,46], implicitly consider this attacker model. The boundaries of this model are blurred and the attacker's capabilities are unclear.…”
Section: Introductionmentioning
confidence: 99%
“…As a result, performance of the systems in terms of optimization issues are really under big threat. The Abstract Interpretation formulation of database systems serves as a formal foundation of many interesting real-life applications, for instance, (i) to address security properties, like watermarking and access control [11,15]; (ii) to provide a novel cooperative query answering schema [12]; (iii) to serve as static analysis framework for transactions to optimize integrity constraint checking [14]; (iv) to perform abstract slicing of applications accessing or manipulating databases [16], etc. In this paper, we address a challenging feature of database query languages: the treatment of recursive queries.…”
Section: Introductionmentioning
confidence: 99%