Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
A Scalable Algorithm for Answering Queries Using Views
VLDB '00 Proceedings of the 26th International Conference on Very Large Data Bases
Answering Queries with Aggregation Using Views
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Algorithms for Materialized View Design in Data Warehousing Environment
VLDB '97 Proceedings of the 23rd International Conference on Very Large Data Bases
DaWaK '99 Proceedings of the First International Conference on Data Warehousing and Knowledge Discovery
Administering permissions for distributed data: factoring and automated inference
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Towards materialized view selection for distributed databases
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
Authorization views and conditional query containment
ICDT'05 Proceedings of the 10th international conference on Database Theory
Hi-index | 0.00 |
Ensuring security of data is one of the fundamental needs of people. In this context, issues related to confidentiality, integrity and availability of the data arise with a crucial importance, whether in economic, legal or medical domains. Standards covering fine-grained access control were proposed and adopted to control access to data through queries. In this paper, we propose a novel approach to facilitate the administration of access control rules to ensure the confidentiality of data at the level of materialized views. Several techniques and models have been proposed to control access to databases, but to our knowledge the problem of automatically generating from access control rules defined over base relations the applicable access control rules needed to control materialized views is not investigated. We are investigating this problem by resorting to an adaptation of query rewriting techniques. We choose to express fine-grained access control through authorization views. This paper mainly discusses the problem of automatically ensuring confidentiality of materialized views based on basic access control rules, and identifies formal tools to tackle the problem.