Extending query rewriting techniques for fine-grained access control
Top Cited Papers
- 13 June 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 551-562
- https://doi.org/10.1145/1007568.1007631
Abstract
Current day database applications, with large numbers of users, require fine-grained access control mechanisms, at the level of individual tuples, not just entire relations/views, to control which parts of the data can be accessed by each user. Fine-grained access control is often enforced in the application code, which has numerous drawbacks; these can be avoided by specifying/enforcing access control at the database level. We present a novel fine-grained access control model based on authorization views that allows "authorization-transparent" querying; that is, user queries can be phrased in terms of the database relations, and are valid if they can be answered using only the information contained in these authorization views. We extend earlier work on authorization-transparent querying by introducing a new notion of validity, conditional validity. We give a powerful set of inference rules to check for query validity. We demonstrate the practicality of our techniques by describing how an existing query optimizer can be extended to perform access control checks by incorporating these inference rules.© ACKeywords
This publication has 16 references indexed in Scilit:
- The inference problemACM SIGKDD Explorations Newsletter, 2002
- Answering queries using views: A surveyThe VLDB Journal, 2001
- Flexible support for multiple access control policiesACM Transactions on Database Systems, 2001
- Optimizing queries using materialized viewsPublished by Association for Computing Machinery (ACM) ,2001
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- Secure databases: constraints, inference channels, and monitoring disclosuresIEEE Transactions on Knowledge and Data Engineering, 2000
- Rewriting aggregate queries using viewsPublished by Association for Computing Machinery (ACM) ,1999
- Panorama: A database system that annotates its answers to queries with their propertiesJournal of Intelligent Information Systems, 1996
- Characteristics of role-based access controlPublished by Association for Computing Machinery (ACM) ,1996
- Protection in operating systemsCommunications of the ACM, 1976