메뉴 건너뛰기




Volumn , Issue , 2008, Pages 289-298

A formal framework for reflective database access control policies

Author keywords

Fine grained access control; Formal safety verification; Reflective database access control; Transaction datalog

Indexed keywords

ACCESS CONTROL LISTS; ACCESS CONTROL POLICIES; DATABASE ACCESS CONTROL; DATABASE QUERIES; DATALOG; FINE-GRAINED ACCESS CONTROL; FORMAL FRAMEWORK; FORMAL SAFETY VERIFICATION; REFLECTIVE DATABASE ACCESS CONTROL; SECURE IMPLEMENTATION; TRANSACTION DATALOG;

EID: 69949149767     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455808     Document Type: Conference Paper
Times cited : (25)

References (35)
  • 1
    • 0026204067 scopus 로고
    • Datalog extensions for database queries and updates
    • Aug
    • S. Abiteboul and V. Vianu. Datalog extensions for database queries and updates. Journal of Computer and System Sciences, 43(1):62-124, Aug. 1991.
    • (1991) Journal of Computer and System Sciences , vol.43 , Issue.1 , pp. 62-124
    • Abiteboul, S.1    Vianu, V.2
  • 2
    • 28444446666 scopus 로고    scopus 로고
    • Extending relational database systems to automatically enforce privacy policies
    • Tokyo, Japan, Apr
    • R. Agrawal, P. Bird, T. Grandison, J. Kicrnan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In ICDE 05, Tokyo, Japan, Apr. 2005.
    • (2005) ICDE 05
    • Agrawal, R.1    Bird, P.2    Grandison, T.3    Kicrnan, J.4    Logan, S.5    Rjaibi, W.6
  • 4
    • 70349282755 scopus 로고    scopus 로고
    • A history-dependent access control mechanism using reflection
    • Lisbon, Portugal, Jun
    • M. Ancona, W. Cazzola, and E. B. Fernandez. A history-dependent access control mechanism using reflection. In MOS 99, Lisbon, Portugal, Jun. 1999.
    • (1999) MOS 99
    • Ancona, M.1    Cazzola, W.2    Fernandez, E.B.3
  • 5
    • 84976736962 scopus 로고    scopus 로고
    • F. Bancilhon and R. R,ama,krishnan. An amateur's introduction to recursive query processing strategics. In SIGMOD 86, Washington, DC, May 1986.
    • F. Bancilhon and R. R,ama,krishnan. An amateur's introduction to recursive query processing strategics. In SIGMOD 86, Washington, DC, May 1986.
  • 6
    • 39049153474 scopus 로고    scopus 로고
    • Using attribute-based access control to enable attribute-based messaging
    • Miami Beach, FL, Dec
    • R. Bobba, O. Fatcmich, F. Khan, C. A. Guntcr, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC 06, Miami Beach, FL, Dec. 2006.
    • (2006) ACSAC 06
    • Bobba, R.1    Fatcmich, O.2    Khan, F.3    Guntcr, C.A.4    Khurana, H.5
  • 7
    • 70349291845 scopus 로고    scopus 로고
    • Transaction datalog: A compositional language for transaction programming
    • A. J. Bonner, Transaction datalog: A compositional language for transaction programming. Lecture Notes in Computer Science, 1369:373-395, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1369 , pp. 373-395
    • Bonner, A.J.1
  • 8
    • 0032676577 scopus 로고    scopus 로고
    • Workflow, transactions, and datalog
    • Philadelphia, PA, Jun
    • A. J. Bonner. Workflow, transactions, and datalog. In PODS 99, Philadelphia, PA, Jun. 1999.
    • (1999) PODS 99
    • Bonner, A.J.1
  • 10
    • 34548810781 scopus 로고    scopus 로고
    • Fine grained authorization through predicated grants
    • Istanbul, Turkey, Apr
    • S. Chaudhuri, T. Dutta, and S. Sudarshan. Fine grained authorization through predicated grants. In ICDE 07, Istanbul, Turkey, Apr. 2007.
    • (2007) ICDE 07
    • Chaudhuri, S.1    Dutta, T.2    Sudarshan, S.3
  • 11
    • 67650303573 scopus 로고    scopus 로고
    • Rule based database security system and method
    • United States Patent 6,820,082, Nov
    • W. R. Cook and M. R. Gannholm. Rule based database security system and method. United States Patent 6,820,082, Nov. 2004.
    • (2004)
    • Cook, W.R.1    Gannholm, M.R.2
  • 12
    • 34548026791 scopus 로고    scopus 로고
    • A posteriori compliance control
    • Sophia Antipolis, France, Jun
    • S. Etalle and W. H. Winsborough. A posteriori compliance control. In SACMAT 07, Sophia Antipolis, France, Jun. 2007.
    • (2007) SACMAT 07
    • Etalle, S.1    Winsborough, W.H.2
  • 13
    • 0021444827 scopus 로고
    • Logic and databases: A deductive approach
    • Jun
    • H. Gallaire, J. Minker, and J.-M. Nicolas. Logic and databases: A deductive approach. ACM Computing Surveys, 16(2):153-185, Jun. 1984.
    • (1984) ACM Computing Surveys , vol.16 , Issue.2 , pp. 153-185
    • Gallaire, H.1    Minker, J.2    Nicolas, J.-M.3
  • 14
    • 0036994798 scopus 로고    scopus 로고
    • Instance-level access control for business-to-business electronic commerce
    • R. Goodwin, S. Goh, and F. Y. Wu. Instance-level access control for business-to-business electronic commerce. IBM Systems Journal, 41(2):303-321, 2002.
    • (2002) IBM Systems Journal , vol.41 , Issue.2 , pp. 303-321
    • Goodwin, R.1    Goh, S.2    Wu, F.Y.3
  • 15
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • Sep
    • P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. In TODS, l(3):242-255, Sep. 1976.
    • (1976) TODS , vol.50 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 16
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • C. A. Gunter and T. Jim. Policy-directed certificate retrieval. Software- Practice and Experience, 30(15): 1609-1640, 2000.
    • (2000) Software- Practice and Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 20
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • Oakland, CA, May
    • T. Jim. SD3: A trust management system with certified evaluation. In IEEE Security and Privacy, Oakland, CA, May 2001.
    • (2001) IEEE Security and Privacy
    • Jim, T.1
  • 21
    • 34250649785 scopus 로고    scopus 로고
    • Redundancy and information leakage in fine-grained access control
    • Chicago, IL, Jun
    • G. Kabra, R. Ramamurthy, and S. Sudarshan. Redundancy and information leakage in fine-grained access control. In SIGMOD 06, Chicago, IL, Jun. 2006.
    • (2006) SIGMOD 06
    • Kabra, G.1    Ramamurthy, R.2    Sudarshan, S.3
  • 24
    • 27544510789 scopus 로고    scopus 로고
    • On safety in discretionary access control
    • Oakland, CA, May
    • N. Li and M. V. Tripunitara. On safety in discretionary access control. In IEEE Security and Privacy, Oakland, CA, May 2005.
    • (2005) IEEE Security and Privacy
    • Li, N.1    Tripunitara, M.V.2
  • 25
    • 85027181850 scopus 로고
    • Concepts and experiments in computational reflection
    • Orlando, FL, Oct
    • P. Maes. Concepts and experiments in computational reflection. In OOPSLA 87, Orlando, FL, Oct. 1987.
    • (1987) OOPSLA 87
    • Maes, P.1
  • 26
    • 70349291844 scopus 로고    scopus 로고
    • Oracle Virtual Private Database
    • Oracle Corporation, Technical report, Oracle Corporation, Jun
    • Oracle Corporation. Oracle Virtual Private Database. Technical report, Oracle Corporation, Jun. 2005. http://www.oracle.com/technology/deploy/security/ db-security/virtual-private-database/index.html.
    • (2005)
  • 27
    • 70349276448 scopus 로고    scopus 로고
    • Oracle service request number 5973395.992. Technical support communication
    • Oracle Corporation, Jan
    • Oracle Corporation. Oracle service request number 5973395.992. Technical support communication, Jan. 2007.
    • (2007)
  • 28
    • 70349276447 scopus 로고    scopus 로고
    • Extending query rewriting techniques for fine-grained access control
    • Paris, France, Jun
    • S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD 0J., Paris, France, Jun. 2004.
    • (2004) SIGMOD 0J
    • Rizvi, S.1    Mendelzon, A.2    Sudarshan, S.3    Roy, P.4
  • 29
    • 70349293388 scopus 로고    scopus 로고
    • Extending SQL's grant and revoke operations, to limit and reactivate privileges
    • Schoorl, The Netherlands, Aug
    • A. Rosenthal and E. Sciore. Extending SQL's grant and revoke operations, to limit and reactivate privileges. In DBSec 00, Schoorl, The Netherlands, Aug. 2000.
    • (2000) DBSec 00
    • Rosenthal, A.1    Sciore, E.2
  • 31
    • 0028541987 scopus 로고
    • Modular stratification and magic sets for datalog programs with negation
    • Nov
    • K. A. Ross. Modular stratification and magic sets for datalog programs with negation. Journal of the A CM, 41(6):1216-1266, Nov. 1994.
    • (1994) Journal of the A CM , vol.41 , Issue.6 , pp. 1216-1266
    • Ross, K.A.1
  • 32
    • 3543115068 scopus 로고    scopus 로고
    • A layered design of discretionary access controls with decidable safety properties
    • Oakland, CA, May
    • J. A. Solworth and R. H. Sloan. A layered design of discretionary access controls with decidable safety properties. In IEEE Security and Privacy, Oakland, CA, May 2004.
    • (2004) IEEE Security and Privacy
    • Solworth, J.A.1    Sloan, R.H.2
  • 33
    • 70349299590 scopus 로고    scopus 로고
    • Sybase, Inc. New security features in Sybase Adaptive Server Enterprise. Technical report, Sybase, Inc., 2003. http://www.Sybase.com/content/1013009/new- security-wp.pdf.
    • Sybase, Inc. New security features in Sybase Adaptive Server Enterprise. Technical report, Sybase, Inc., 2003. http://www.Sybase.com/content/1013009/new- security-wp.pdf.
  • 34
    • 0017013056 scopus 로고
    • The semantics of predicate logic as a programming language
    • M. H. van Emden and R. A. Kowalski. The semantics of predicate logic as a programming language. Journal of the ACM, 23(4):733-742, 1976.
    • (1976) Journal of the ACM , vol.23 , Issue.4 , pp. 733-742
    • van Emden, M.H.1    Kowalski, R.A.2
  • 35
    • 33751029574 scopus 로고    scopus 로고
    • Policy-driven reflective enforcement of security policies
    • Dijon, France, Apr
    • I. Welch and F. Lu. Policy-driven reflective enforcement of security policies. In SAC 06, Dijon, France, Apr. 2006.
    • (2006) SAC 06
    • Welch, I.1    Lu, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.