Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Database security
ACM Transactions on Database Systems (TODS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
Supporting Multiple Access Control Policies in Database Systems
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
A Generic Content-Management Tool for Web Databases
IEEE Internet Computing
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Modelling Security Policies in Hypermedia and Web-Based Applications
Web Engineering, Software Engineering and Web Application Development
A propositional policy algebra for access control
ACM Transactions on Information and System Security (TISSEC)
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
ObjectGlobe: Ubiquitous query processing on the Internet
The VLDB Journal — The International Journal on Very Large Data Bases
Administering permissions for distributed data: factoring and automated inference
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
Towards a credential-based implementation of compound access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Presto Authorization: A Bitmap Indexing Scheme for High-Speed Access Control to XML Documents
IEEE Transactions on Knowledge and Data Engineering
On the efficiency of checking perfect privacy
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Access control in collaborative commerce
Decision Support Systems
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
Towards secure information sharing using role-based delegation
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
A new approach for building secure applications based on internet infrastructure
International Journal of Computer Applications in Technology
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Flexible Resolution of Authorisation Conflicts in Distributed Systems
DSOM '08 Proceedings of the 19th IFIP/IEEE international workshop on Distributed Systems: Operations and Management: Managing Large-Scale Service Deployment
Preventing conflict situations during authorization
WSEAS Transactions on Computers
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
Belnap's Logic in Sharing Protected Web Resources
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Practical declarative network management
Proceedings of the 1st ACM workshop on Research on enterprise networking
Distributed and Parallel Databases
Telehealth/AT '08 Proceedings of the IASTED International Conference on Telehealth/Assistive Technologies
Positive and negative authorizations to access protected web resources
NBiS'07 Proceedings of the 1st international conference on Network-based information systems
A unified conflict resolution algorithm
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Query rewriting algorithm evaluation for XML security views
SDM'07 Proceedings of the 4th VLDB conference on Secure data management
Security-driven model-based dynamic adaptation
Proceedings of the IEEE/ACM international conference on Automated software engineering
Joining privately on outsourced data
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Hybrid authorizations and conflict resolution
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
TBA: a hybrid of logic and extensional access control systems
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Model-driven adaptive delegation
Proceedings of the 12th annual international conference on Aspect-oriented software development
APCCM '13 Proceedings of the Ninth Asia-Pacific Conference on Conceptual Modelling - Volume 143
Hi-index | 0.00 |
In this article, we present an authorization model that can be used to express a number of discretionary access control policies for relational data management systems. The model permits both positive and negative authorizations and supports exceptions at the same time. The model is flexible in that the users can specify, for each authorization they grant, whether the authorization can allow for exceptions or whether it must be strongly obeyed. It provides authorization management for groups with exceptions at any level of the group hierarchy, and temporary suspension of authorizations. The model supports ownership together with decentralized administration of authorizations. Administrative privileges can also be restricted so that owners retain control over their tables.