Please use this identifier to cite or link to this item:
https://scholarbank.nus.edu.sg/handle/10635/41634
DC Field | Value | |
---|---|---|
dc.title | Specifying access control policies on data streams | |
dc.contributor.author | Carminati, B. | |
dc.contributor.author | Ferrari, E. | |
dc.contributor.author | Kian, L.T. | |
dc.date.accessioned | 2013-07-04T08:32:06Z | |
dc.date.available | 2013-07-04T08:32:06Z | |
dc.date.issued | 2007 | |
dc.identifier.citation | Carminati, B.,Ferrari, E.,Kian, L.T. (2007). Specifying access control policies on data streams. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 4443 LNCS : 410-421. ScholarBank@NUS Repository. | |
dc.identifier.isbn | 9783540717027 | |
dc.identifier.issn | 03029743 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/41634 | |
dc.description.abstract | Many data stream processing systems are increasingly being used to support applications that handle sensitive information, such as credit card numbers and locations of soldiers in battleground [1,2,3,6], These data have to be protected from unauthorized accesses. However, existing access control models and mechanisms cannot be adequately adopted on data streams. In this paper, we propose a novel access control model for data streams based on the Aurora data model [2], Our access control model is role-based and has the following components. Objects to be protected are essentially views (or rather queries) over data streams. We also define two types of privileges - Read privilege for operations such as Filter, Map, BSort, and a set of aggregate privileges for operations such as Min, Max, Count, Avg and Sum. The model also allows the specification of temporal constraints either to limit access to data during a given time bound or to constraint aggregate operations over the data within a specified time window. In the paper, we present the access control model and its formal semantics. © Springer-Verlag Berlin Heidelberg 2007. | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.sourcetitle | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | |
dc.description.volume | 4443 LNCS | |
dc.description.page | 410-421 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.