Supporting multiple access control policies in database systems
- 23 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Although there are several choices of policies for protection of information, access control models have been developed for a fixed set pre-defined access control policies that are then built into the corresponding access control mechanisms. This becomes a problem, however, if the access control requirements of an application are different from the policies built into a mechanism. In most cases, the only solution is to enforce the requirements as part of the application code, but this makes verification, modification, and adequate enforcement of these policies impossible. In this paper, we propose a flexible authorization mechanism that can support different security policies. The mechanism enforces a general authorization model onto which multiple access control policies can be mapped. The model permits negative and positive authorizations, authorizations that must be strongly obeyed and authorizations that allow for exceptions, and enforces ownership together with delegation of administrative privileges.Keywords
This publication has 12 references indexed in Scilit:
- Modeling the "Multipolicy Machine"Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A framework for expressing models of security policyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An extended authorization model for relational databasesIEEE Transactions on Knowledge and Data Engineering, 1997
- Access control: principle and practiceIEEE Communications Magazine, 1994
- Authorizations in relational database management systemsPublished by Association for Computing Machinery (ACM) ,1993
- Access control for collaborative environmentsPublished by Association for Computing Machinery (ACM) ,1992
- A model of authorization for next-generation database systemsACM Transactions on Database Systems, 1991
- Naming and grouping privileges to simplify security management in large databasesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1990
- On an authorization mechanismACM Transactions on Database Systems, 1978
- An authorization mechanism for a relational database systemACM Transactions on Database Systems, 1976