Integrating trust management and access control in data-intensive Web applications

  • Authors:
  • Sabrina De Capitani Di Vimercati;Sara Foresti;Sushil Jajodia;Stefano Paraboschi;Giuseppe Psaila;Pierangela Samarati

  • Affiliations:
  • DTI, Università degli Studi di Milano, Italy;DTI, Università degli Studi di Milano, Italy;CSIS, George Mason University, USA;DIIMM, Università degli Studi di Bergamo, Italy;DIIMM, Università degli Studi di Bergamo, Italy;DTI, Università degli Studi di Milano, Italy

  • Venue:
  • ACM Transactions on the Web (TWEB)
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The widespread diffusion of Web-based services provided by public and private organizations emphasizes the need for a flexible solution for protecting the information accessible through Web applications. A promising approach is represented by credential-based access control and trust management. However, although much research has been done and several proposals exist, a clear obstacle to the realization of their benefits in data-intensive Web applications is represented by the lack of adequate support in the DBMSs. As a matter of fact, DBMSs are often responsible for the management of most of the information that is accessed using a Web browser or a Web service invocation. In this article, we aim at eliminating this gap, and present an approach integrating trust management with the access control of the DBMS. We propose a trust model with a SQL syntax and illustrate an algorithm for the efficient verification of a delegation path for certificates. Our solution nicely complements current trust management proposals allowing the efficient realization of the services of an advanced trust management model within current relational DBMSs. An important benefit of our approach lies in its potential for a robust end-to-end design of security for personal data in Web scenario, where vulnerabilities of Web applications cannot be used to violate the protection of the data residing on the database server. We also illustrate the implementation of our approach within an open-source DBMS discussing design choices and performance impact.