2017
DOI: 10.1007/978-3-319-62105-0_1
|View full text |Cite
|
Sign up to set email alerts
|

SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications

Abstract: Abstract. Policy-based access control is a technology that achieves separation of concerns through evaluating an externalized policy at each access attempt. While this approach has been well-established for requestresponse applications, it is not supported for database queries of datadriven applications, especially for attribute-based policies. In particular, search operations for such applications involve poor scalability with regard to the data set size for this approach, because they are influenced by dynam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 16 publications
0
4
0
Order By: Relevance
“…The established policy language and access control model eXtensible Access Control Markup Language (XACML) [2], for example, supports separation of concerns. In addition, in research prototypes like the ones presented by Bertino et al (2001), Colombo and Ferrari (2017), Kacimi and Benhlima (2017), Bogaerts et al (2017) and Mohamed et al (2022), authorization policy management and enforcement are also independent of the application and the underlying datastore. However, there are still many integrated and platform-dependent approaches.…”
Section: Separation Of Concerns (R5)mentioning
confidence: 99%
“…The established policy language and access control model eXtensible Access Control Markup Language (XACML) [2], for example, supports separation of concerns. In addition, in research prototypes like the ones presented by Bertino et al (2001), Colombo and Ferrari (2017), Kacimi and Benhlima (2017), Bogaerts et al (2017) and Mohamed et al (2022), authorization policy management and enforcement are also independent of the application and the underlying datastore. However, there are still many integrated and platform-dependent approaches.…”
Section: Separation Of Concerns (R5)mentioning
confidence: 99%
“…Let us now focus on the key requirements that we have considered in defining an approach to evaluate the impact of access control policies on data handled by NoSQL systems. These requirements have been derived from the literature on access control (e.g., [13,4]), existing enforcement monitors (e.g., Apache Ranger 5 ), and features of NoSQL datastores.…”
Section: Requirementsmentioning
confidence: 99%
“…delField (du, oid); end (4) for oid ∈ π tbp (du) do (5) delField (du, oid); end (6) delField (du, "tbs"); (7) delField (du, "tbp"); (8) return du; end Algorithm 5), field tbs of du collects all the placeholders for which a substitution is required. In the considered scenario, tbs only includes the string 53da, which represents the identifier of a field of du specifying as value an object characterized by the fields Date, From, Cc, To, and Subject.…”
Section: Return Du Endmentioning
confidence: 99%
See 1 more Smart Citation