Evaluating the effects of access control policies within NoSQL systems

نویسندگان

چکیده

Abstract Access control is a key service of any data management system. It allows regulating the access to resources at different granularity levels on basis models which vary protection options they offer. The more powerful model in terms requirements, difficult for security administrators understand effect set policies protected resources. This further complicated within schemaless systems, like NoSQL datastores, when fine grained are specified characterized by heterogeneous structures. lack reference and related manipulation languages exacerbates this issue. To best our knowledge, general approach evaluate impact systems still missing. In paper, we start fill void, proposing agnostic approach, which, starting from datasets discretionary models, derives view that points out authorized unauthorized contents. Experimental results show efficiency even with large datasets.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Evaluating Access Control Policies Through Model Checking

We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the policies give legitimate users enough permissions to reach their goals, but also checking whether the policies prevent intruders from reaching their malicious goals. Policies of the access control system and goals of ...

متن کامل

Uniform access to NoSQL systems

Non-relational databases (often termed as NoSQL) have recently emerged and have generated both interest and criticism. Interest because they address requirements that are very important in large-scale applications, criticism because of the comparison with well known relational achievements. One of the major problems often mentioned is the heterogeneity of the languages and of the interfaces the...

متن کامل

Access Control Policies for Traceability Information Systems

Traceability information systems need to collect and process data from multiple companies across the supply chain and many of the business partners are not known in advance. This open-ended security is, in principle, a good match for a Service-Oriented Architecture (SOA) design and for the use of Web Services (WS) technologies because they implement flexible and inter-operable systems based on ...

متن کامل

Access Control Policies and Languages Access Control Policies and Languages

Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Generation Computer Systems

سال: 2021

ISSN: ['0167-739X', '1872-7115']

DOI: https://doi.org/10.1016/j.future.2020.08.026