2009
DOI: 10.1007/978-3-642-03007-9_2
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Reflective Access Control in SQL

Abstract: Abstract. Reflective Database Access Control (RDBAC)is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege in an access control matrix. RDBAC aids the management of database access controls by improving the expressiveness of policies. The Transaction Datalog language provides a powerful syntax and semantics for expressing RDBAC policies, however there is no efficient implementation of this language for practical database systems. We demonstrate a str… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
4
0

Year Published

2009
2009
2017
2017

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 12 publications
(22 reference statements)
0
4
0
Order By: Relevance
“…RDBAC is a novel access control model that has recently been developed [12,13]. Our work demonstrates the feasibility of using RDBAC and highlighting the advantages of using the TD language in a real-world application.…”
Section: Related Workmentioning
confidence: 82%
See 1 more Smart Citation
“…RDBAC is a novel access control model that has recently been developed [12,13]. Our work demonstrates the feasibility of using RDBAC and highlighting the advantages of using the TD language in a real-world application.…”
Section: Related Workmentioning
confidence: 82%
“…RDBAC removes these restrictions and allows policies to refer to any part of the database. Previous work has shown how formal security analysis of RDBAC policies can be tractably performed [13], and how an RDBAC system can be implemented in standard, off-the-shelf relational databases [12].…”
mentioning
confidence: 99%
“…FGAC uses query rewriting tech-niques [1, 5,8,10,15,19] to provide database security. This is typically performed using rules that are specified in the native query language of the target database and may be realized through the creation of views.…”
Section: Background and Related Workmentioning
confidence: 99%
“…As a result, such access control techniques cannot be effectively enforced at the database at a granularity level that exceeds the application. This is also the case for many techniques that employ query rewriting to optimize access control [5,10,15,18]. One technique that mitigates this issue is Virtual Private Database (VPD, [1]).…”
Section: Related Workmentioning
confidence: 99%