Observation-based Fine Grained Access Control of Data

In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where data are made accessible at various levels of abstractions accord- ing to their sensitivity levels. In this setting, unauthorized users are not able to infer the exact content of the confiden- tial data, while they are allowed to get partial information out of it, according to their access rights. The traditional fine grained access control (FGAC) can be seen as a special case of the OFGAC framework.

[1]  S. Sudarshan,et al.  Extending query rewriting techniques for fine-grained access control , 2004, SIGMOD '04.

[2]  Matthias Kirschner,et al.  Detecting Suspicious Relational Database Queries , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[3]  Brajendra Panda,et al.  Monitoring Information Leakage During Query Aggregation , 2007, ICDCIT.

[4]  Agostino Cortesi,et al.  Widening and narrowing operators for abstract interpretation , 2011, Comput. Lang. Syst. Struct..

[5]  Agostino Cortesi,et al.  Observation-Based Fine Grained Access Control for XML Documents , 2011, CISIM.

[6]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010, J. Univers. Comput. Sci..

[7]  Hong Zhu,et al.  Fine-Grained Access Control for Database Management Systems , 2007, BNCOD.

[8]  Rakesh Agrawal,et al.  Extending relational database systems to automatically enforce privacy policies , 2005, 21st International Conference on Data Engineering (ICDE'05).

[9]  Sabrina De Capitani di Vimercati,et al.  A fine-grained access control system for XML documents , 2002, TSEC.

[10]  Agostino Cortesi,et al.  Abstract interpretation of database query languages , 2012, Comput. Lang. Syst. Struct..

[11]  Peng Liu,et al.  QFilter: fine-grained run-time XML access control via NFA-based query rewriting , 2004, CIKM '04.

[12]  Makoto Murata,et al.  XML access control using static analysis , 2006, TSEC.

[13]  Agostino Cortesi,et al.  Fine Grained Access Control for Relational Databases by Abstract Interpretation , 2010, ICSOFT.

[14]  Ernesto Damiani,et al.  Design and implementation of an access control processor for XML documents , 2000, Comput. Networks.

[15]  Hong Zhu,et al.  Controlling Information Leakage of Fine-Grained Access Model in DBMSs , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[16]  Neha Sehta,et al.  A Fine Grained Access Control Model for Relational Databases , 2012 .

[17]  Yi Mu,et al.  Delegatable Access Control for Fine-Grained XML , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).

[18]  David J. DeWitt,et al.  Limiting Disclosure in Hippocratic Databases , 2004, VLDB.

[19]  Elisa Bertino,et al.  Secure and selective dissemination of XML documents , 2002, TSEC.

[20]  Agostino Cortesi,et al.  Abstract Interpretation of Recursive Queries , 2013, ICDCIT.

[21]  Tsan-sheng Hsu,et al.  Quantifying Privacy Leakage through Answering Database Queries , 2002, ISC.

[22]  Laks V. S. Lakshmanan,et al.  Compressed Accessibility Map: Efficient Access Control for XML , 2002, VLDB.

[23]  Tao Jiang,et al.  On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs , 2009, 2009 Eighth IEEE/ACIS International Conference on Computer and Information Science.

[24]  Peng Liu,et al.  Supporting XML Security Models Using Relational Databases: A Vision , 2003, Xsym.

[25]  Jorge Lobo,et al.  On the Correctness Criteria of Fine-Grained Access Control in Relational Databases , 2007, VLDB.

[26]  Sotiris Ioannidis,et al.  Controlling Access to XML Documents over XML Native and Relational Databases , 2009, Secure Data Management.

[27]  Lu Chang Client-Based Access Control Management for XML Documents , 2006 .

[28]  Mong-Li Lee,et al.  Access Control of XML Documents in Relational Database Systems , 2001, International Conference on Internet Computing.

[29]  Patrick Cousot,et al.  Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.

[30]  S. Sudarshan,et al.  Redundancy and information leakage in fine-grained access control , 2006, SIGMOD Conference.

[31]  Andrew C. Myers,et al.  Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..

[32]  Agostino Cortesi,et al.  Abstract program slicing of database query languages , 2013, SAC '13.