ACStream: Enforcing Access Control Over Data Streams

被引:0
|
作者
Cao, Jianneng [1 ]
Carminati, Barbara [2 ]
Ferrari, Elena [2 ]
Tan, Kian-Lee [1 ]
机构
[1] Natl Univ Singapore, Singapore 117548, Singapore
[2] Univ Insubria, DICOM, Varese, Italy
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this demo proposal, we illustrate ACStream, a system built on top of StreamBase [1], to specify and enforce access control policies over data streams. ACStream supports a very flexible role-based access control model specifically designed to protect against unauthorized access to streaming data. The core component of ACStream is a query rewriting mechanism that, by exploiting a set of secure operators proposed by us in [2], rewrites a user query in such a way that it does not violate the specified access control policies during its execution. The demo will show how policies modelling a variety of access control requirements can be easily specified and enforced using ACStream.
引用
收藏
页码:1495 / +
页数:2
相关论文
共 50 条
  • [31] Enforcing Scalable and Dynamic Hierarchical Access Control in Cloud Computing
    Yang, Ran
    Lin, Chuang
    Jiang, Yixin
    2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2012,
  • [32] Privacy promises, access control, and privacy management - Enforcing privacy throughout an enterprise by extending access control
    Powers, CS
    Ashley, P
    Schunter, M
    THIRD INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE, PROCEEDINGS, 2002, : 13 - 21
  • [33] Enforcing spatio-temporal access control in mobile applications
    Abdunabi, Ramadan
    Sun, Wuliang
    Ray, Indrakshi
    COMPUTING, 2014, 96 (04) : 313 - 353
  • [34] Enforcing Access Control in Web-Based Social Networks
    Carminati, Barbara
    Ferrari, Elena
    Perego, Andrea
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 13 (01)
  • [35] A flexible hierarchical access control mechanism enforcing extension policies
    Chang, Ya-Fen
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 189 - 201
  • [36] On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
    Garrison, William C., III
    Shull, Adam
    Myers, Steven
    Lee, Adam J.
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 819 - 838
  • [37] Modeling and enforcing access control policies in conversational user interfaces
    Elena Planas
    Salvador Martínez
    Marco Brambilla
    Jordi Cabot
    Software and Systems Modeling, 2023, 22 : 1925 - 1944
  • [38] Enforcing spatio-temporal access control in mobile applications
    Ramadan Abdunabi
    Wuliang Sun
    Indrakshi Ray
    Computing, 2014, 96 : 313 - 353
  • [39] Specifying and enforcing access control policies for XML document sources
    Bertino E.
    Castano S.
    Ferrari E.
    Mesiti M.
    World Wide Web, 2000, 3 (03) : 139 - 151
  • [40] Modeling and enforcing access control policies in conversational user interfaces
    Planas, Elena
    Martinez, Salvador
    Brambilla, Marco
    Cabot, Jordi
    SOFTWARE AND SYSTEMS MODELING, 2023, 22 (06): : 1925 - 1944