2016 IEEE 32nd International Conference on Data Engineering (ICDE) 2016
DOI: 10.1109/icde.2016.7498240
|View full text |Cite
|
Sign up to set email alerts
|

Towards Virtual Private NoSQL datastores

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 21 publications
(25 citation statements)
references
References 15 publications
0
24
0
1
Order By: Relevance
“…As far as document-oriented datastores, efficient solutions to the integration of fine-grained purpose-based access control into MongoDB have been proposed in Colombo and Ferrari (2016) and (2017a). In Colombo and Ferrari (2017a) the RBAC model natively integrated in MongoDB has been enhanced with the support for the specification and enforcement of purpose-based policies (Byun and Li 2008) regulating the access up to document level.…”
Section: Nosql Datastoresmentioning
confidence: 99%
See 2 more Smart Citations
“…As far as document-oriented datastores, efficient solutions to the integration of fine-grained purpose-based access control into MongoDB have been proposed in Colombo and Ferrari (2016) and (2017a). In Colombo and Ferrari (2017a) the RBAC model natively integrated in MongoDB has been enhanced with the support for the specification and enforcement of purpose-based policies (Byun and Li 2008) regulating the access up to document level.…”
Section: Nosql Datastoresmentioning
confidence: 99%
“…In Colombo and Ferrari (2016), the framework presented in Colombo and Ferrari (2017a) has been significantly extended, introducing the support for access control policies regulating the access up to field level, and providing support to specification and enforcement of content and context based policies. The proposed enforcement monitor, denoted ConfinedMem, applies the same logic as Mem, but it operates according to a twostep process, which consists of: 1) the derivation of the authorized views of all documents to be accessed by a submitted query q included in a message m requiring the access to data resources, 2) the rewriting of m as m' in such a way that m' specifies a query q' which can only access the authorized views of the documents to be accessed by q.…”
Section: Nosql Datastoresmentioning
confidence: 99%
See 1 more Smart Citation
“…Research efforts have also been recently focused on the integration of FGAC into NoSQL datastores (e.g., [10,12,16]) and map-reduce analytics platforms (e.g., [22]). For instance, Kulkarni [16] has proposed a finegrained access control model for key-value systems denoted K-VAC, which has been first designed to operate with Cassandra, 11 and then extended for the integration into HBase.…”
Section: Related Workmentioning
confidence: 99%
“…The analysis of the literature lead us to identify possible strategies to address issues related to the definition of policy specification criteria, enforcement strategies, the implementation of the proposed mechanisms by an enforcement monitor, and aspects related to integration of the monitor into existing document-oriented datastores. The analysis described in this paper is partially based on early research experiences on NoSQL datastores that we did with MongoDB [10,12], as well as on ongoing research activities finalized to the generalization of the approach in [10,12].…”
Section: Introductionmentioning
confidence: 99%