Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies - SACMAT '06 2006
DOI: 10.1145/1133058.1133074
|View full text |Cite
|
Sign up to set email alerts
|

Systematic control and management of data integrity

Abstract: Integrity has long been considered a fundamental requirement for secure computerized systems, and especially today's demand for data integrity is stronger than ever as many organizations are increasing their reliance on data and information systems. A number of recently enacted data privacy regulations also require high integrity for personal data. In this paper, we discuss various issues concerning systematic control and management of data integrity with a primary focus on access control. We first examine som… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 18 publications
(24 reference statements)
0
6
0
Order By: Relevance
“…In some delegation models, delegation is managed by the delegator him/herself. Through a survey of the literature, [2] define a set of data integrity requirements; control of information-flow, data verification, prevention of fraud and error, and autonomous data validation. With these requirements in mind, they present the design of architecture for data integrity control systems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In some delegation models, delegation is managed by the delegator him/herself. Through a survey of the literature, [2] define a set of data integrity requirements; control of information-flow, data verification, prevention of fraud and error, and autonomous data validation. With these requirements in mind, they present the design of architecture for data integrity control systems.…”
Section: Introductionmentioning
confidence: 99%
“…While Algorithm 3 and 4 gives revocation procedure of delegation by the delegator and using time out respectively. PBDM WITH CWSP (first step Delegation)Input:[1] Delegation request (u, r) URA[2] user u create tdr from set of regular role RR[3] p P э p is the permission set of tdr own(u)Output:True, if the delegation is successful False, if the delegation failedBeginStep 1:tdr own (u) and delegatee information are send to Delegation Constraint Judgment for processingStep 2: for USER_O(r) = {u| where r RR and u U then (u, r) URA}.If (u, r, u') can-delegate /* u delegator and u' be delegate*/Step 3: Return True Else Step 4: Return False End ALGORITHM 2: for Multi-step delegation Input: [1] a delegation request (u, tdr) UDA [2] u create tdr from set of regular role TDR [3] p P э p is the permission set of tdr own(u) Output: True, if delegation is successful False, if delegation failed Begin Step 1: tdr own (u) and delegatee information are send to Delegation Constraint Judgment for processing Step 2: USER_D (tdr) = {u| where tdr TDR and u U then (u, tdr) UDAn}. If (u, tdr, u') can-furtherdelegate/* u delegator and u' be delegate*/ Step 3: Return True Else Step 4: Return False End 3.2.5 Architectural and Web Design of PBDM with CWSP The figure 3 below shows how permission roles are delegated from the delegator user1 on system1 to delegatee according to the following 3 phases.…”
mentioning
confidence: 99%
“…to access to certain parts of wiki documents. Particularly, this function is essential if data integrity [4] is necessary against some attacks, e.g., scripted attacks or vandalism from malicious users.…”
Section: Introductionmentioning
confidence: 99%
“…In [8], a rule-based framework is proposed for role-based delegation and revocation. In [9], systematic control and management architecture of data integrity based on metadata management is shown.…”
Section: Roles Prms Pamentioning
confidence: 99%
“…However, it is hard to say a particular model fits given requirements with admissible costs, because there is not an established way of comparing RBAC extensions in terms of safety and cost effectiveness. Extended RBAC models have been compared with existing ones by qualitative analysis or by evaluation on a particular implementation [9]. In this paper, we propose a systematic and qualitative risk evaluation method for RBAC models, consisting of the following elements: (1) Common fault trees [14] [15] are constructed based on the core functions of RBAC, augmented with functions for enterprise-level RBAC, and risk events obtained from past accidents and incidents [11][12]13].…”
Section: Introductionmentioning
confidence: 99%