The well-founded semantics for general logic programs
Journal of the ACM (JACM)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A closed-form evaluation for Datalog queries with integer (gap)-order constraints
ICDT Selected papers of the 4th international conference on Database theory
Authorizations in relational database management systems
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Maintaining views incrementally
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Datalog with integer periodicity constraints
ILPS '94 Proceedings of the 1994 International Symposium on Logic programming
Efficient maintenance of materialized mediated views
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
A non-ground realization of the stable and well-founded semantics
Theoretical Computer Science
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Decentralized administration for a temporal access control model
Information Systems
An introduction to database systems (7th ed.)
An introduction to database systems (7th ed.)
Informix guide to SQL
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
Safe Stratified Datalog with Integer Order Programs
CP '95 Proceedings of the First International Conference on Principles and Practice of Constraint Programming
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
An access control model for video database systems
Proceedings of the ninth international conference on Information and knowledge management
Building tractable disjunctive constraints
Journal of the ACM (JACM)
A logical framework for reasoning about access control models
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
A temporal key management scheme for secure broadcasting of XML documents
Proceedings of the 9th ACM conference on Computer and communications security
Symbolic representation of user-defined time granularities
Annals of Mathematics and Artificial Intelligence
Efficient Querying and Animation of Periodic Spatio-Temporal Databases
Annals of Mathematics and Artificial Intelligence
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Symbolic User-Defined Periodicity in Temporal Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Parametric Rectangles: A Model for Querying and Animation of Spatiotemporal Databases
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
DATALOG with Constraints: A Foundation for Trust Management Languages
PADL '03 Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
TRBAC: A Temporal Authorization Model
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Efficient Querying of Periodic Spatiotemporal Objects
CP '02 Proceedings of the 6th International Conference on Principles and Practice of Constraint Programming
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
A Logical Framework for Reasoning on Data Access Control Policies
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Constraints-based access control
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Obligation Monitoring in Policy Management
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Provisions and Obligations in Policy Rule Management
Journal of Network and Systems Management
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
A logical specification for usage control
Proceedings of the ninth ACM symposium on Access control models and technologies
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
Efficient and flexible access control via logic program specialisation
Proceedings of the 2004 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation
A compositional framework for access control policies enforcement
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
ACM Transactions on Information and System Security (TISSEC)
Applying Semantic Knowledge to Real-Time Update of Access Control Policies
IEEE Transactions on Knowledge and Data Engineering
IEEE Transactions on Dependable and Secure Computing
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
Multimedia Tools and Applications
A mathematical framework for the semantics of symbolic languages representing periodic time
Annals of Mathematics and Artificial Intelligence
Inferring dynamic credentials for rôle-based trust management
Proceedings of the 8th ACM SIGPLAN international conference on Principles and practice of declarative programming
LTL Over integer periodicity constraints
Theoretical Computer Science
A framework for decentralized access control
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A lattice-based approach for updating access control policies in real-time
Information Systems
Future Generation Computer Systems
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Weaving temporal and reliability aspects into a schema tapestry
Data & Knowledge Engineering
Information and Computation
On the design, implementation and application of an authorisation architecture for web services
International Journal of Information and Computer Security
A cost-driven approach to role engineering
Proceedings of the 2008 ACM symposium on Applied computing
Dynamic anonymization: accurate statistical analysis with privacy preservation
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Preservation of proximity privacy in publishing numerical sensitive data
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
A modular approach to user-defined symbolic periodicities
Data & Knowledge Engineering
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Efficient and flexible access control via Jones-optimal logic program specialisation
Higher-Order and Symbolic Computation
ACM Transactions on Information and System Security (TISSEC)
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Verification of qualitative Z constraints
Theoretical Computer Science
Towards the development of privacy-aware systems
Information and Software Technology
Role Based Access Control with Spatiotemporal Context for Mobile Applications
Transactions on Computational Science IV
The next 700 access control models or a unifying meta-model?
Proceedings of the 14th ACM symposium on Access control models and technologies
An assessment of accountability policies for large-scale distributed computing systems
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
Automatic transformations between geoscience standards using XML
Computers & Geosciences
Access control for XML documents and data
Information Security Tech. Report
The hardness and approximation algorithms for l-diversity
Proceedings of the 13th International Conference on Extending Database Technology
Dynamic event-based access control as term rewriting
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A semantic information retrieval advertisement and policy based system for a P2P network
DBISP2P'05/06 Proceedings of the 2005/2006 international conference on Databases, information systems, and peer-to-peer computing
STARBAC: spatiotemporal role based access control
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
Monitoring security policies with metric first-order temporal logic
Proceedings of the 15th ACM symposium on Access control models and technologies
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
A formal language for specifying complex XML authorisations with temporal constraints
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Temporal authorizations scheme for XML document
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
Branching-time temporal logic extended with qualitative presburger constraints
LPAR'06 Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A unified framework for heterogeneous patterns
Information Systems
Enforcing subscription-based authorization policies in cloud scenarios
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Incorporating temporal capabilities in existing key management schemes
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Proceedings of the 18th ACM symposium on Access control models and technologies
Agent-based accountable grid computing systems
The Journal of Supercomputing
Improving security and efficiency of time-bound access to outsourced data
Proceedings of the 6th ACM India Computing Convention
Hi-index | 0.02 |
Access control models, such as the ones supported by commercial DBMSs, are not yet able to fully meet many application needs. An important requirement derives from the temporal dimension that permissions have in many real-world situations. Permissions are often limited in time or may hold only for specific periods of time. In this article, we present an access control model in which periodic temporal intervals are associated with authorizations. An authorization is automatically granted in the specified intervals and revoked when such intervals expire. Deductive temporal rules with periodicity and order constraints are provided to derive new authorizations based on the presence or absence of other authorizations in specific periods of time. We provide a solution to the problem of ensuring the uniqueness of the global set of valid authorizations derivable at each instant, and we propose an algorithm to compute this set. Moreover, we address issues related to the efficiency of access control by adopting a materialization approach. The resulting model provides a high degree of flexibility and supports the specification of several protection requirements that cannot be expressed in traditional access control models.