首页 > 最新文献

Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

英文 中文
Contemporaneous Update and Enforcement of ABAC Policies. ABAC政策的同步更新和执行。
Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya

Access control policies are dynamic in nature, and therefore require frequent updates to synchronize with the latest organizational security requirements. As these updates are handled, it is important that all user access requests be answered contemporaneously and correctly without any interruption or delay. In this paper, considering the context of Attribute Based Access Control (ABAC), we propose an approach that is capable of immediately materializing any update to the policy and ensuring that it is taken into account for any subsequent access requests. One possibility is to update the policy based on the incoming changes through ABAC policy mining techniques. However, it turns out that no existing mining approach can offer correct enforcement of policies when access requests are entertained during the updates. We provide a formal proof for this surprising result and then propose an approach called δwOP that does not suffer from this problem. Essentially, δwOP keeps track of the needed information from updates and uses this in conjunction with the existing ABAC policy rules to make access decisions. We present the complexity analysis as well as a comprehensive experimental evaluation to demonstrate the efficacy of the proposed approach for different types of changes.

访问控制策略本质上是动态的,因此需要经常更新以与最新的组织安全需求同步。在处理这些更新时,重要的是要同时正确地回答所有用户访问请求,而不会有任何中断或延迟。在本文中,考虑到基于属性的访问控制(ABAC)的上下文,我们提出了一种能够立即实现对策略的任何更新并确保将其考虑到任何后续访问请求的方法。一种可能性是通过ABAC策略挖掘技术根据传入的更改更新策略。然而,事实证明,没有任何现有的挖掘方法可以在更新期间处理访问请求时提供正确的策略执行。我们为这个惊人的结果提供了一个形式化的证明,然后提出了一种称为δwOP的方法,它不会受到这个问题的困扰。从本质上讲,δwOP跟踪更新所需的信息,并将其与现有的ABAC策略规则结合使用以做出访问决策。我们提出了复杂性分析以及一个全面的实验评估,以证明所提出的方法对不同类型的变化的有效性。
{"title":"Contemporaneous Update and Enforcement of ABAC Policies.","authors":"Samir Talegaon,&nbsp;Gunjan Batra,&nbsp;Vijayalakshmi Atluri,&nbsp;Shamik Sural,&nbsp;Jaideep Vaidya","doi":"10.1145/3532105.3535021","DOIUrl":"https://doi.org/10.1145/3532105.3535021","url":null,"abstract":"<p><p>Access control policies are dynamic in nature, and therefore require frequent updates to synchronize with the latest organizational security requirements. As these updates are handled, it is important that all user access requests be answered contemporaneously and correctly without any interruption or delay. In this paper, considering the context of Attribute Based Access Control (ABAC), we propose an approach that is capable of immediately materializing any update to the policy and ensuring that it is taken into account for any subsequent access requests. One possibility is to update the policy based on the incoming changes through ABAC policy mining techniques. However, it turns out that no existing mining approach can offer correct enforcement of policies when access requests are entertained during the updates. We provide a formal proof for this surprising result and then propose an approach called <i>δ</i>wOP that does not suffer from this problem. Essentially, <i>δ</i>wOP keeps track of the needed information from updates and uses this in conjunction with the existing ABAC policy rules to make access decisions. We present the complexity analysis as well as a comprehensive experimental evaluation to demonstrate the efficacy of the proposed approach for different types of changes.</p>","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"2022 ","pages":"31-42"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9732837/pdf/nihms-1854495.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9588370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead 在分散的在线社交网络中保护内容:解决方案、限制和前进的道路
R. D. Pietro
{"title":"Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead","authors":"R. D. Pietro","doi":"10.1145/3532105.3535041","DOIUrl":"https://doi.org/10.1145/3532105.3535041","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"1 1","pages":"1-2"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74388616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions 海报:将时间和地点纳入访问控制决策的基于云的软件
Mustafa Al-Lail
The increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in cloud security. Certain situations exist where it is necessary to restrict access to cloud resources based on time and location. An example is a policy for a medical institution where doctors can only access patient records at hospitals during their shifts. The Generalized Spatio-Temporal Role-Based Access Control model (GSTRBAC) determines users’ access to resources based on such information. This poster proposes a cloud-based software architecture and outlines it possible implementation of the GSTRBAC model.
对云计算的日益依赖引起了人们对云提供商安全弱点的关注。不仅如何访问信息,而且何时何地访问信息都已成为云安全中的重要考虑因素。在某些情况下,有必要根据时间和地点限制对云资源的访问。一个例子是医疗机构的政策,其中医生只能在轮班期间访问医院的患者记录。基于角色的广义时空访问控制模型(GSTRBAC)根据这些信息决定用户对资源的访问权限。这张海报提出了一个基于云的软件架构,并概述了GSTRBAC模型的可能实现。
{"title":"Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions","authors":"Mustafa Al-Lail","doi":"10.1145/3450569.3464395","DOIUrl":"https://doi.org/10.1145/3450569.3464395","url":null,"abstract":"The increasing dependency on cloud computing has drawn attention to the security weaknesses of cloud providers. Not only how information is accessed, but also where and when have become important considerations in cloud security. Certain situations exist where it is necessary to restrict access to cloud resources based on time and location. An example is a policy for a medical institution where doctors can only access patient records at hospitals during their shifts. The Generalized Spatio-Temporal Role-Based Access Control model (GSTRBAC) determines users’ access to resources based on such information. This poster proposes a cloud-based software architecture and outlines it possible implementation of the GSTRBAC model.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"23 1","pages":"55-57"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82806401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021 SACMAT '21:第26届ACM访问控制模型和技术研讨会,虚拟事件,西班牙,2021年6月16日至18日
{"title":"SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021","authors":"","doi":"10.1145/3450569","DOIUrl":"https://doi.org/10.1145/3450569","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84752734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. 海报:使用基尼杂质挖掘基于环境属性的访问控制策略。
Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri

In Attribute-based Access Control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attributes helps in achieving a more fine-grained access control. In this paper, we present an ABAC policy mining algorithm that considers the environment attributes and their associated values while forming the rules. Furthermore, we use gini impurity to form the rules. This helps to minimize the number of rules in the generated policy. The experimental evaluation shows that our approach is quite effective in practice.

在基于属性的访问控制(ABAC)系统中,利用环境属性以及主体和客体属性为访问决策引入了动态性。包含环境属性有助于实现更细粒度的访问控制。本文提出了一种ABAC策略挖掘算法,该算法在形成规则时考虑了环境属性及其关联值。此外,我们使用基尼杂质来形成规则。这有助于最小化生成策略中的规则数量。实验结果表明,该方法在实际应用中是非常有效的。
{"title":"Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.","authors":"Saptarshi Das,&nbsp;Shamik Sural,&nbsp;Jaideep Vaidya,&nbsp;Vijayalakshmi Atluri","doi":"10.1145/3205977.3208949","DOIUrl":"https://doi.org/10.1145/3205977.3208949","url":null,"abstract":"<p><p>In Attribute-based Access Control (ABAC) systems, utilizing environment attributes along with the subject and object attributes introduces a dynamic nature to the access decisions. The inclusion of environment attributes helps in achieving a more fine-grained access control. In this paper, we present an ABAC policy mining algorithm that considers the environment attributes and their associated values while forming the rules. Furthermore, we use gini impurity to form the rules. This helps to minimize the number of rules in the generated policy. The experimental evaluation shows that our approach is quite effective in practice.</p>","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"2018 ","pages":"213-215"},"PeriodicalIF":0.0,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1145/3205977.3208949","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"36903222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Comprehensive integrity protection for desktop linux 全面的完整性保护桌面linux
Wai-Kit Sze, R. Sekar
Information flow provides principled defenses against malware. It can provide system-wide integrity protection without requiring any program-specific understanding. Information flow policies have been around for 40+ years but they have not been explored in today's context. Specifically, they are not designed for contemporary software and OSes. Applying these policies directly on today's OSes affects usability. In this paper, we focus our attention on an information-flow based integrity protection system that we implemented for Linux, with the goal of minimizing usability impact. We discuss the design decisions made in this system and provide insights on building usable information flow systems.
信息流提供了针对恶意软件的原则性防御。它可以提供系统范围的完整性保护,而不需要任何特定于程序的理解。信息流政策已经存在了40多年,但在今天的背景下还没有被探索过。具体来说,它们不是为当代软件和操作系统设计的。在今天的操作系统上直接应用这些策略会影响可用性。在本文中,我们将注意力集中在我们为Linux实现的基于信息流的完整性保护系统上,其目标是将可用性影响最小化。我们讨论了在该系统中做出的设计决策,并提供了构建可用信息流系统的见解。
{"title":"Comprehensive integrity protection for desktop linux","authors":"Wai-Kit Sze, R. Sekar","doi":"10.1145/2613087.2613112","DOIUrl":"https://doi.org/10.1145/2613087.2613112","url":null,"abstract":"Information flow provides principled defenses against malware. It can provide system-wide integrity protection without requiring any program-specific understanding. Information flow policies have been around for 40+ years but they have not been explored in today's context. Specifically, they are not designed for contemporary software and OSes. Applying these policies directly on today's OSes affects usability. In this paper, we focus our attention on an information-flow based integrity protection system that we implemented for Linux, with the goal of minimizing usability impact. We discuss the design decisions made in this system and provide insights on building usable information flow systems.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"18 1","pages":"89-92"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82359695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards more usable information flow policies for contemporary operating systems 为当代操作系统提供更可用的信息流策略
Wai-Kit Sze, B. Mital, R. Sekar
There has been a resurgence of interest in information flow based techniques in security. A key attraction of these techniques is that they can provide strong, principled protection against malware, regardless of its sophistication. In spite of this advantage, most advances in information flow control have not been adopted in mainstream operating systems since a strict application of information flow can limit system functionality and usability. Permitting dynamic changes to subject labels, as proposed in the low-watermark model, provides better usability. However, it suffers from the self-revocation problem, whereby read/write operations on already open files are denied because the label of the subject performing these operations has been downgraded. While most applications deal gracefully with security failures on file open operations, they are unprepared to handle security violations on subsequent reads/writes. As a result, subject downgrades may lead to crashes or malfunction. Even those applications that deal with read/write errors may still leave output files in a corrupted or inconsistent state since write permissions were taken away in the midst of producing an output file. To overcome these drawbacks, we propose a new approach for dynamic downgrading that eliminates the self-revocation problem. We show that our approach represents an optimal combination of functionality and compatibility. Our experimental evaluation shows that our approach is efficient, incurring an overhead of a few percentage points, is compatible with existing applications, and provides strong integrity protection.
基于信息流的安全技术重新引起了人们的兴趣。这些技术的一个关键吸引力在于,无论恶意软件多么复杂,它们都可以提供强大的原则性保护。尽管有这样的优势,信息流控制的大多数进步并没有被主流操作系统所采用,因为严格的信息流应用会限制系统的功能和可用性。允许动态更改主题标签,如在低水位模型中提出的,提供了更好的可用性。但是,它存在自我撤销问题,即对已经打开的文件的读/写操作被拒绝,因为执行这些操作的主体的标签已经降级。虽然大多数应用程序可以很好地处理文件打开操作中的安全故障,但它们没有准备好处理后续读/写操作中的安全违规。因此,主题降级可能导致崩溃或故障。即使是那些处理读/写错误的应用程序也可能使输出文件处于损坏或不一致的状态,因为在生成输出文件的过程中,写入权限被剥夺了。为了克服这些缺点,我们提出了一种新的动态降级方法,消除了自撤销问题。我们展示了我们的方法代表了功能和兼容性的最佳组合。我们的实验评估表明,我们的方法是有效的,产生了几个百分点的开销,与现有的应用程序兼容,并提供了强大的完整性保护。
{"title":"Towards more usable information flow policies for contemporary operating systems","authors":"Wai-Kit Sze, B. Mital, R. Sekar","doi":"10.1145/2613087.2613110","DOIUrl":"https://doi.org/10.1145/2613087.2613110","url":null,"abstract":"There has been a resurgence of interest in information flow based techniques in security. A key attraction of these techniques is that they can provide strong, principled protection against malware, regardless of its sophistication. In spite of this advantage, most advances in information flow control have not been adopted in mainstream operating systems since a strict application of information flow can limit system functionality and usability. Permitting dynamic changes to subject labels, as proposed in the low-watermark model, provides better usability. However, it suffers from the self-revocation problem, whereby read/write operations on already open files are denied because the label of the subject performing these operations has been downgraded. While most applications deal gracefully with security failures on file open operations, they are unprepared to handle security violations on subsequent reads/writes. As a result, subject downgrades may lead to crashes or malfunction. Even those applications that deal with read/write errors may still leave output files in a corrupted or inconsistent state since write permissions were taken away in the midst of producing an output file. To overcome these drawbacks, we propose a new approach for dynamic downgrading that eliminates the self-revocation problem. We show that our approach represents an optimal combination of functionality and compatibility. Our experimental evaluation shows that our approach is efficient, incurring an overhead of a few percentage points, is compatible with existing applications, and provides strong integrity protection.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"22 1","pages":"75-84"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87030578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? 在新的计算领域,如移动、云和网络物理系统中,访问控制面临的最重要挑战是什么?
Lujo Bauer, F. Kerschbaum
We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems; and our everyday lives are invaded by sensors like smart meters and electronic tickets. The days when most computing resources were managed directly by a computer's operating system are over---data and computation is distributed, and devices are typically always connected via the Internet. In light of this shift, it is important to revisit the basic security properties we desire of computing systems and the mechanisms that we use to provide them. A building block of most of the security we enjoy in today's systems is access control. This panel will examine the challenges we face in adapting the access control models, techniques, and tools produced thus far to today's and tomorrow's computing environments. Key characteristics of these new systems that may require our approach to access control to change is that in many (e.g., cloud) systems users do not directly control their data; that a vast population of users operating mobile and other new devices has very little education in their use; and that cyber-physical systems permeate our environment to the point where they are often invisible to their users. Access control comprises enforcement systems, specification languages, and policy-management tools or approaches. In each of these areas the shifting computing landscape leaves us examining how current technology can be applied to new contexts or looking for new technology to fill the gap. Enforcement of access-control policy based on a trusted operating system, for example, does not cleanly translate to massively distributed, heterogeneous computing environments; to environments with many devices that are minimally administered or administered with minimal expertise; and to potentially untrusted clouds that hold sensitive data and computations that belong to entities other than the cloud owner. What technologies or system components should be the building blocks of enforcement in these settings?
我们正在看到常用计算设备的类型和特征发生了重大变化。如今,智能手机的销量已经超过了个人电脑。云系统也是一个快速增长的领域;我们的日常生活被智能电表和电子票等传感器所侵扰。大多数计算资源由计算机操作系统直接管理的时代已经过去了——数据和计算是分布式的,设备通常总是通过互联网连接。鉴于这种转变,有必要重新审视我们希望计算系统具备的基本安全属性,以及我们用来提供这些属性的机制。在当今的系统中,我们所享受的大多数安全性的一个组成部分是访问控制。该小组将研究我们在使访问控制模型、技术和工具适应当今和未来的计算环境方面所面临的挑战。这些可能需要我们改变访问控制方法的新系统的关键特征是,在许多(例如,云)系统中,用户并不直接控制他们的数据;大量使用手机和其他新设备的用户对这些设备的使用知之甚少;而且,网络物理系统渗透到我们的环境中,以至于用户往往看不见它们。访问控制包括实施系统、规范语言和策略管理工具或方法。在这些领域中,不断变化的计算环境让我们研究如何将当前技术应用于新的环境,或者寻找新的技术来填补空白。例如,基于可信操作系统的访问控制策略的实施不能清晰地转换为大规模分布式、异构计算环境;对于具有许多设备的环境,这些设备的管理程度最低,或者管理人员的专业知识最低;以及可能不受信任的云,这些云存储着属于云所有者以外实体的敏感数据和计算。在这些设置中,哪些技术或系统组件应该是执行的构建块?
{"title":"What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?","authors":"Lujo Bauer, F. Kerschbaum","doi":"10.1145/2613087.2613090","DOIUrl":"https://doi.org/10.1145/2613087.2613090","url":null,"abstract":"We are seeing a significant shift in the types and characteristics of computing devices that are commonly used. Today, more smartphones are sold than personal computers. An area of rapid growth are also cloud systems; and our everyday lives are invaded by sensors like smart meters and electronic tickets. The days when most computing resources were managed directly by a computer's operating system are over---data and computation is distributed, and devices are typically always connected via the Internet.\u0000 In light of this shift, it is important to revisit the basic security properties we desire of computing systems and the mechanisms that we use to provide them. A building block of most of the security we enjoy in today's systems is access control. This panel will examine the challenges we face in adapting the access control models, techniques, and tools produced thus far to today's and tomorrow's computing environments. Key characteristics of these new systems that may require our approach to access control to change is that in many (e.g., cloud) systems users do not directly control their data; that a vast population of users operating mobile and other new devices has very little education in their use; and that cyber-physical systems permeate our environment to the point where they are often invisible to their users.\u0000 Access control comprises enforcement systems, specification languages, and policy-management tools or approaches. In each of these areas the shifting computing landscape leaves us examining how current technology can be applied to new contexts or looking for new technology to fill the gap. Enforcement of access-control policy based on a trusted operating system, for example, does not cleanly translate to massively distributed, heterogeneous computing environments; to environments with many devices that are minimally administered or administered with minimal expertise; and to potentially untrusted clouds that hold sensitive data and computations that belong to entities other than the cloud owner. What technologies or system components should be the building blocks of enforcement in these settings?","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"1 1","pages":"127-128"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89494277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized and controlled provisioning of encrypted outsourced data 优化和控制加密外包数据的供应
A. Schaad, Anis Bkakria, F. Kerschbaum, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard
Recent advances in encrypted outsourced databases support the direct processing of queries on encrypted data. Depend- ing on functionality (i.e. operators) required in the queries the database has to use different encryption schemes with different security properties. Next to these functional re-quirements a security administrator may have to address security policies that may equally determine the used en-cryption schemes. We present an algorithm and tool set that determines an optimal balance between security and functionality as well as helps to identify and resolve possible conflicts. We test our solution on a database benchmark and business-driven security policies.
加密外包数据库的最新进展支持直接处理对加密数据的查询。根据查询所需的功能(即操作符),数据库必须使用具有不同安全属性的不同加密方案。除了这些功能需求之外,安全管理员可能还必须处理安全策略,这些策略可能同样决定了所使用的加密方案。我们提出了一种算法和工具集,可以确定安全性和功能之间的最佳平衡,并有助于识别和解决可能的冲突。我们在数据库基准和业务驱动的安全策略上测试我们的解决方案。
{"title":"Optimized and controlled provisioning of encrypted outsourced data","authors":"A. Schaad, Anis Bkakria, F. Kerschbaum, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard","doi":"10.1145/2613087.2613100","DOIUrl":"https://doi.org/10.1145/2613087.2613100","url":null,"abstract":"Recent advances in encrypted outsourced databases support the direct processing of queries on encrypted data. Depend- ing on functionality (i.e. operators) required in the queries the database has to use different encryption schemes with different security properties. Next to these functional re-quirements a security administrator may have to address security policies that may equally determine the used en-cryption schemes. We present an algorithm and tool set that determines an optimal balance between security and functionality as well as helps to identify and resolve possible conflicts. We test our solution on a database benchmark and business-driven security policies.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"157 1","pages":"141-152"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75732901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Redaction based RDF access control language 基于编校的RDF访问控制语言
Jyothsna Rachapalli, V. Khadilkar, Murat Kantarcioglu, B. Thuraisingham
We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. The access control language presented is equipped with critical features such as policy resolution and cascading policies that are essential for fine grained RDF access control. We present the architecture of our system which primarily features a flexible, scalable and general purpose RDF access control mechanism.
我们提出了一种用于保护RDF图的访问控制语言,它本质上利用了基于查询语言的底层编校机制来提供细粒度的RDF访问控制。所提供的访问控制语言配备了策略解析和级联策略等关键特性,这些特性对于细粒度RDF访问控制至关重要。我们给出了我们系统的架构,它主要以灵活、可扩展和通用的RDF访问控制机制为特征。
{"title":"Redaction based RDF access control language","authors":"Jyothsna Rachapalli, V. Khadilkar, Murat Kantarcioglu, B. Thuraisingham","doi":"10.1145/2613087.2613108","DOIUrl":"https://doi.org/10.1145/2613087.2613108","url":null,"abstract":"We propose an access control language for securing RDF graphs which essentially leverages an underlying query language based redaction mechanism to provide fine grained RDF access control. The access control language presented is equipped with critical features such as policy resolution and cascading policies that are essential for fine grained RDF access control. We present the architecture of our system which primarily features a flexible, scalable and general purpose RDF access control mechanism.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"59 1","pages":"177-180"},"PeriodicalIF":0.0,"publicationDate":"2014-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82806360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1