STREAM: the stanford stream data manager (demonstration description)
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
TelegraphCQ: continuous dataflow processing
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Aurora: a new model and architecture for data stream management
The VLDB Journal — The International Journal on Very Large Data Bases
Securing the Borealis Data Stream Engine
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Specifying access control policies on data streams
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Secure shared continuous query processing
Proceedings of the 2011 ACM Symposium on Applied Computing
Multilevel secure data stream processing
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Semantic access control for corporate mobile devices
ICA3PP'10 Proceedings of the 10th international conference on Algorithms and Architectures for Parallel Processing - Volume Part II
City on the Sky: Extending XACML for Flexible, Secure Data Sharing on the Cloud
Journal of Grid Computing
Information flow control for stream processing in clouds
Proceedings of the 18th ACM symposium on Access control models and technologies
Multilevel secure data stream processing: Architecture and implementation
Journal of Computer Security - DBSec 2011
Hi-index | 0.00 |
Access control is an important component of any computational system. However, it is only recently that mechanisms to guard against unauthorized access for streaming data have been proposed. In this paper, we study how to enforce the role-based access control model proposed by us in [5]. We design a set of novel secure operators, that basically filter out tuples/attributes from results of the corresponding (non-secure) operators that are not accessible according to the specified access control policies. We further develop an access control mechanism to enforce the access control policies based on these operators. We show that our method is secure according to the specified policies.