Please use this identifier to cite or link to this item: https://doi.org/10.1145/1805974.1805984
DC FieldValue
dc.titleA framework to enforce access control over data streams
dc.contributor.authorCarminati, B.
dc.contributor.authorFerrari, E.
dc.contributor.authorCao, J.
dc.contributor.authorTan, K.L.
dc.date.accessioned2013-07-04T07:46:13Z
dc.date.available2013-07-04T07:46:13Z
dc.date.issued2010
dc.identifier.citationCarminati, B., Ferrari, E., Cao, J., Tan, K.L. (2010). A framework to enforce access control over data streams. ACM Transactions on Information and System Security 13 (3). ScholarBank@NUS Repository. https://doi.org/10.1145/1805974.1805984
dc.identifier.issn10949224
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/39641
dc.description.abstractAlthough access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized access to streaming data have started to be investigated. To cope with this lack, in this article, we propose a general framework to protect streaming data, which is, as much as possible, independent from the target stream engine. Differently from RDBMSs, up to now a standard query language for data streams has not yet emerged and this makes the development of a general solution to access control enforcement more difficult. The framework we propose in this article is based on an expressive role-based access controlmodel proposed by us. It exploits a query rewriting mechanism, which rewrites user queries in such a way that they do not return tuples/attributes that should not be accessed according to the specified access control policies. Furthermore, the framework contains a deployment module able to translate the rewritten query in such a way that it can be executed by different stream engines, therefore, overcoming the lack of standardization. In the article, besides presenting all the components of our framework, we prove the correctness and completeness of the query rewriting algorithm, and we present some experiments that show the feasibility of the developed techniques. © 2010 ACM.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1145/1805974.1805984
dc.sourceScopus
dc.subjectAccess control
dc.subjectData stream
dc.subjectSecure query rewriting
dc.typeArticle
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1145/1805974.1805984
dc.description.sourcetitleACM Transactions on Information and System Security
dc.description.volume13
dc.description.issue3
dc.identifier.isiut000280545800010
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.