The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
The Art and Science of Computer Security
The Art and Science of Computer Security
D-CAPE: distributed and self-tuned continuous query processing
Proceedings of the 14th ACM international conference on Information and knowledge management
Foundations and Trends in Databases
A Security Punctuation Framework for Enforcing Access Control on Streaming Data
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Secure shared continuous query processing
Proceedings of the 2011 ACM Symposium on Applied Computing
A security aware stream data processing scheme on the cloud and its efficient execution methods
Proceedings of the fourth international workshop on Cloud data management
Information flow control for stream processing in clouds
Proceedings of the 18th ACM symposium on Access control models and technologies
A privacy preserving framework for managing vehicle data in road pricing systems
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Multilevel secure data stream processing: Architecture and implementation
Journal of Computer Security - DBSec 2011
Hi-index | 0.00 |
We propose to demonstrate the StreamShield, a system designed to address the problem of security and privacy in the context of Data Stream Management Systems (DSMSs). In StreamShield, continuous access control is enforced by taking a novel "stream-centric" approach towards security. Security policies are not persistently stored on the server, but rather are depicted by security metadata, called "security punctuations", and get embedded into streams together with the data. We distinguish between two types of security punctuations: (1) the "data security punctuations" (dsps) describing the data-side security policies, and (2) the "query security punctuations" (qsps) representing the query-side security policies. The advantages of such stream-centric security model include flexibility, dynamicity and speed of enforcement. Furthermore, DSMSs can adapt to not only data-related but also to security-related selectivities, which helps reduce the waste of resources, when few subjects have access to streaming data.