Back to Search
Start Over
An extended access control mechanism exploiting data dependencies.
- Source :
-
International Journal of Information Security . Feb2017, Vol. 16 Issue 1, p75-89. 15p. - Publication Year :
- 2017
-
Abstract
- In general, access control mechanisms in DBMSs ensure that users access only those portions of data for which they have authorizations, according to a predefined set of access control policies. However, it has been shown that access control mechanisms might be not enough. A clear example is the inference problem due to functional dependencies, which might allow a user to discover unauthorized data by exploiting authorized data. In this paper, we wish to investigate data dependencies (e.g., functional dependencies, foreign key constraints, and knowledge-based implications) from a different perspective. In particular, the aim was to investigate data dependencies as a mean for increasing the DBMS utility, that is, the number of queries that can be safely answered, rather than as channels for releasing sensitive data. We believe that, under given circumstances, this unauthorized release may give more benefits than issues. As such, we present a query rewriting technique capable of extending defined access control policies by exploiting data dependencies, in order to authorize unauthorized but inferable data. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 16155262
- Volume :
- 16
- Issue :
- 1
- Database :
- Academic Search Index
- Journal :
- International Journal of Information Security
- Publication Type :
- Academic Journal
- Accession number :
- 120785046
- Full Text :
- https://doi.org/10.1007/s10207-016-0322-4