Towards a Rule-based Access Control Framework for Distributed Information Systems

Size: px
Start display at page:

Download "Towards a Rule-based Access Control Framework for Distributed Information Systems"

Transcription

1 Towards a Rule-based Access Control Framework for Distributed Information Systems Sergey Afonin Institute of Mechanics, Moscow State University Michurinskij av., 1, Moscow, Russian Federation serg@msu.ru Abstract Rule-based access control is a powerful and flexible paradigm for specifying security policies in information systems. Access may be granted or denied depending on object s and subject s properties, or the context of the request, such as current time. Complex access control rules are typically implemented at application level. In this paper we describe a framework targeted to separation of access control rules from the main application logic. It is assumed that access policies are managed in a distributed fashion (discretionary access control), objects are stored in relational database, and requests are independent. Such assumptions correspond to a RESTful web application. We describe a proof of concept implementation and discuss efficiency and decidability issues of access checking and policy verification problems. I. INTRODUCTION In many information systems access control rules are hardcoded into main application logic. This is typically so for Web-centric systems. When page request arrives, the server first validates that the requested operation can be executed by the requester. Application level access control rules could be quite complex and depend on various parameters, including object s and subject s properties and context of the request. For example, one can define that a user is allowed to modify document if he belongs to some group (subject s property) and the document was signed (object s property) no more than two days ago (request context). Such rules can be easily implemented in the target programming language (PHP, Python, Ruby or Java in case of web application) and typical application contains code like return an error message when access conditions are not met, or process the request. The obvious drawback of hard-coded access control rules is that application code should be altered each time the security policy changes. Any modification of the source code, in turn, requires repeated testing, and so on. Moreover, if access control rules are implemented in a Turing-complete language one can not automatically validate any non-trivial property of the implemented security policy. Classical and the most frequently used in real systems Role-based Access Control (RBAC) model [1] separates application logic form users grouping. It is based on the assumption that roles of an organization are static, while users and their responsibilities might change frequently. RBAC standard provides mechanisms for reducing cost and potential for errors when assigning users to roles within an organization. Static nature of RBAC model makes it less useful for web applications characterized by dynamic access control rules. In basic RBAC model it is difficult to express many natural constraints, such as rule registered users can modify their own objects. In order to overcome limitations of RBAC model, a number of extensions have been proposed in the literature. These extensions form an actively developing research area frequently referenced to as attribute-based access control (ABAC) or rule-based access control, allow one to specify security policy by means of rules that depend on application level objects attributes. According to [2], [3] such extensions fall into following three classes: Dynamic roles. Roles are assigned to user dynamically, depending on user s and/or context s attributes. Attribute-centric. Roles are considered as subject s attributes. In contrast to RBAC model this approach does not assume permission to role relation. Role-centric. Attributes are used to constrain RBAC roles. Constraint rules can only reduce user s permissions. Rule-based access control appears in many domains, including information systems, database systems, GRID and Cloud computing, Linux kernel, social networks, XML document-security and many others, see e.g. [4] [9]. For the moment there exists no commonly adopted model for attributebased access control. In this paper we discuss a framework motivated by the development of a real system. We believe that methods and tools could be abstracted from the needs of that particular system, yielding a general framework suitable for wide class of information systems. Our goals are: separation of security policy from application logic and ability to perform static analysis of the policy. It is worth noting that development of a general rule-based security framework requires number of complex issues to be solved. First of all, security policy should be defined in terms of application-level objects, so a kind of object-relational mapping (ORM) have to be supported. In many research, e.g. [5], [10], rules can use fixed number of application level objects properties, and these properties are computed by dedicated functions or services written in general purpose programming languages. Application developers need to implement appropriate set of functions, so this approach can not be considered as a general solution. The second issue that should be addressed, is the efficiency of an on-line permission checker. As final decision depends on database state, permission checks might produce undesirable database workload, so permission checker s efficiency may be measured in terms of number of database queries. Finally, static validation of specified policy for redundant or conflicting rules, similar to [11], [12], has to be done MIPRO 2015/ISS

2 The paper is organized as follows. Next section contains brief description of key properties of information system that triggered this research. We also formulate main goals of the proposed security framework. In Section III we describe rule definition language. Algorithmic issues related to policy enforcement and verification are discussed in Section IV. II. A. Motivating Example MOTIVATION AND GOALS This research was motivated by the development of a Current Research Information System named ISTINA 1 for Moscow State University. Let us briefly describe its properties and security-related issues. The system is used to collect information about research and teaching activities (publications, research projects, participation in scientific conferences, membership in program committees, awards, etc.) of university s staff. Some information, such as list of publications in scientific journals, may be imported or verified by accessing external resources, but significant amounts of data are not available from other sources in unified form. As a result, researchers registered in the system are allowed to maintain their own pages. In order to perform more or less reliable scientometric reporting, most critical information is manually verified by authorized users. An authorized user can modify any object authored by anybody from his area of responsibility. Our access control rules are heavily based on authorship relations, object s ownership information, and organization hierarchical structure. For example, an article can be edited by any of its authors, or an authorized user can modify any object created or authored by researchers from his department or its child departments. Some information, such as financial data, may be inaccessible to anybody but authorized users. Role membership, e.g. who are considered as authorized user, may be parameterized by department or other data. For example, membership of a user in administrative staff role is limited to department and its descendant departments. Both permissive (or positive) and restrictive (or negative) rules, defining who are allowed (or not allowed) to perform an operation on specified object are used. Access to individual objects should also be managed. For example, one can grant or revoke editing permissions on specific object to someone who is not in the list of authors, or in the authors list, respectively. Time constrained access is also important, for example, when an administrator wants to be sure that no objects will be modified after the specified deadline. Another usage scenario of the security framework is related to reporting subsystem [13]. Roughly speaking, a report is a parameterized SQL query. Depending on supplied parameters values, a user may be granted access to the report, or not. For example, a dean can access data about his department and its parts, but should not access information about other departments. In both cases, the same report is requested, and this problem can not be resolved by standard access control approaches. In this paper we address only one scenario when all access requests are treated independently and each request is 1 performed on only one object. In other words, there is no interaction between subsequent requests from the same user. This assumption is reasonable for RESTful web applications. If a web page contains information collected from several objects, then this page may be protected as a whole. It is assumed that each department, or each university that uses the system, can define its own security policy and these policies are managed independently. This distributed nature can produce conflicts in case of joint work. For example, if department A allows anybody to delete any object, and department B does not allow to delete objects at all, is it possible to delete a paper authored by researchers from both A and B? At runtime restrictive rule would take precedence as a safer option, but system s behavior will be surprising for some users, regardless of the decision made. Finally, some rules of the policy defined at top administrative level, e.g. university, may be redefined on lower levels, e.g. faculties and departments. The list of rules that may be redefined or overwritten by a subordinate policy writers should be defined by the top level administrator. From the other hand, policy writers from hierarchically unrelated administrative units could produce any rules. Policy conflicts, similar to conflicts caused by coauthored objects, arise when a user has relation to several administrative domain, for example, as a coworker in two institutions. Such conflicts should be resolved dynamically (at runtime), or statically, during policy validation step. B. Goals and Requirements The main goals of the security framework are: Separation of access control logic from application s code. Modifications of security policy should not lead to any changes in application s source code. Static policy checking. In a distributed environment, when several organizations manage their own policies affecting common database, an automated testing for potential conflicts should be possible. It is assumed that application developers provide atomic permissions that are checked in appropriate points. For example, if a user sends a request for object deletion, then application checks that this user can delete this object by issuing function like has_permission(user, object, "delete"). If an object consists of several parts, e.g. paper title and authorship information, access to that parts could be controlled by additional rules and verified by dedicated calls to above mentioned function. For example, a policy could specify that every author of a paper can update title, abstract, and his own authorship information but can not update information about his coauthors. In any case, all checks for specific permissions must be hard-coded, because providing fine-grained access to object s parts can not be realized without programming efforts. Specific security policy should not be defined or implemented in application s source code. When application calls has permission function providing it with information about MIPRO 2015/ISS 1545

3 current user, object and requested operation, that function should perform all necessary checks in accordance to specified policy. In order to guarantee policy enforcement, such calls to has permission function may be performed automatically when the request arrives to application server. This can be done by variety of means, including preprocessing of incoming HTTP requests, defining appropriate middleware of application server framework, or using programming language tools, such as Python s function decorators. The actual implementation of policy enforcement in real application depends on available software or hardware tools, and should be as much mandatory as possible. Another typical problem that arise in Web-centric information system is generation of links available to the user. If user has no rights to perform some operation, e.g. object deletion, then it should be reflected by user interface, for example, by removing or disabling corresponding links. Clearly, generation of a set of active links can be done on top of has permission function. From the other hand, if we know that several permissions have to be checked in a row a more efficient solution could exists. So, from the programming point of view, the framework should support two functions: check for specified permission, and list of all operations that user can perform on given object. Input parameters for check operation are subject (user), object, and requested operation label (required permission). Second function returns list of valid operations for given user and object. We can also specify following additional requirements: rules should be defined in a human-friendly formal language (XML-based languages, such as XACML, is not a suitable option); both permissive and restrictive rule should be supported; if an access is denied, then it should be possible to identify the rule leading to that decision; modification of security policy should be controlled by the same access control system. administrative domains should be separated in the sense that policy writer from one organization can not specify a policy affecting another organization; all conflicts, caused by existence of coauthored objects or coworkers, should be identified at runtime, or discovered statically. III. RULE DEFINITION LANGUAGE As access rule may refer to object s attributes, rule definition language consists of three parts: definition of objects, roles, and rules itself. First part defines set of entities, attributes and relations that can be used in other parts. Parameterized roles are listed in roles definition. Access control rules defines under what constraint a user has permission to evaluate action on specified object. Our proof of concept implementation is performed in Common Lisp (due to Lisp s ability of rapid development of domain specific languages), so we use lisp-friendly syntax for all three parts. A. Definition of Objects and Attributes Objects definition is a kind of Object-Relational Mapping that reflects database structure. Each statement in this section defines an object an access control entity. In terms of target application, objects correspond to a classes or types. In order to simplify descriptions in our proof of concept implementation we associate an object with database table only. (defobject department (table department)) All other relevant information, including attributes, identifiers and related objects, is extracted from the database dictionary. If a table associated with object A contains a foreign key to a table of object B, then an attribute named As (plural form of A s name) is added to B. It is assumed that every database table is equipped with surrogate primary key, so foreign key references are simply integers. In addition to database table name, a list of possible operations on that object can also be specified: (defobject article (table article) (operations (read update delete))) This definition means that only that three operations are relevant for article objects. B. Roles In many applications, user s membership in a role depends on administrative structure of organization, or other parameters. Technically, one can specify the set of roles as a Cartesian product of real roles by departments and manage hierarchical department s structure by means of roles inclusion. Clearly, such system is extremely difficult to support and security policy has to be modified every time department s structure changes. In this work we adopt notion of parameterized roles. Userto-role relation is computed dynamically because the decision on whether or not a user belongs to a role depends on current state of the database. Roles are defined by the following statement. (defrole dean (parameters department)) ;; membership is limited to department C. Rules Rules are used to define conditions what should be satisfied in order to perform operation on object. In terms of [2] this models follows role-centric approach: attributes are used to constraint permissions assigned to roles. Each rule is characterized by: 1546 MIPRO 2015/ISS

4 access type (allow/deny), associated object, list of operations, grantees (roles or users), and access conditions. Formal grammar for rule definitions is presented in Table I. For the lack of simplicity some syntactic sugar constructions are omitted. Let us consider the following example: (rule (comment "Delete articles.") (access allow) ;; allow/deny (object type "article" alias "a") (operations ("delete")) (grantees (roles "admin" ("dean" a.authors.department)) (users "root")) (conditions (and (= a.journal.publisher.name "Springer") (< 2010 a.year)))) Here we define that user root or any member of dean or admin roles are allowed to delete articles that were published in Springer s journals after year The role dean is a parameterized role, so not every dean can delete articles: at least one author of the article should be from the dean s department. When this rule is evaluated during permission checking procedure, object alias a is assigned to the object from user s request. Similarly, a predefined name user is assigned to the structure representing the requester. Two points should be noted. First, a rule may be associated with a parameterized role, and values of role s parameters are related to target object s attributes. Second, conditions part of the definition consists of a list of logical expressions that define conditions required for treating this rule as applicable to given object. Each atomic expression has form (relational-operator operand operand). Operands are XPath-like expressions defining access path to desired property of target object. The above example may be rewritten as a oneliner: (= a[year > 2010].journal.publisher.name "Springer") Here, filtering condition [year > 2010] applied to the object. Filtering condition may contain standard logical connectors and may refer to deeper attributes by means of dot notation. Possibility to overwrite a rule in subordinate administrative unit is controlled like in [10]: a rule has special boolean property strict that states whether or not this particular rule can be redefined. The value of this property itself can be redefined (lowered from True to False) by a subordinate writer. It should be noted that set of objects affected by top-level and low-level rules may differ due to differences in specified RULE ::= (rule { ( clause ) } ) clause ::= comment string object type string [ alias string] access ( allow deny ) operations ( operation {operation} ) grantees ( grantee {grantee} ) strict [ True False ] condition ( expr ) operation ::= string grantee ::= (users user {user} ) (roles [role ( role {selector} ) ] ) user ::= string selector ::= ( object alias) [filter] {. attribute [filter] } alias ::= string filter ::= constant relation (attribute [filter] {. attribute [filter] }) ( filter ) filter [ and or ] filter expr ::= ( relation constant selector ) ( [ and or ] expr {expr} ) relation ::= > < = <= >= like in TABLE I. RULE DEFINITION GRAMMAR. constraints. For example, top level constraint may by stated as year > 2010, while lower level rule may be redefined using year > More than one rule may be defined for the same object type. In this case access is granted if there exists at least one rule that allows the access, and there are no rules that denies it. IV. ALGORITHMIC PROBLEMS In order to make the system useful in real situations, a number of algorithmic issues have to be resolved. First of all, due to highly dynamic nature of access control rules and high rate of such operations, efficient access checking methods should be designed. A. Checking for Access In this section we describe a straight forward algorithm for checking access of a user to specified object and discuss possible improvements. The general idea is to find all applicable rules, i.e. rules that are assigned to specified object and user, and verify whether an access should be granted, or denied. Rules are associated to users or roles. In order to compute a set of candidates of applicable rules, i.e. a set containing all correct items and some false positives, membership of the requesting user in roles has to be verified. Membership in a parameterized role depends on current state of the database, so user-to-role relation should be computed dynamically. Given an expression like (grantees (roles ("dean" a.authors.department))), where a stands for a reference to accessed object (effectively, this is the value of a primary key in corresponding database table), one should verify that current user is a member of any roles dean x, where x runs over the set of all departments accessed by path expression a.authors.department. The set of applicable rules candidates consists of all rules associated with such roles. Once the set of candidates is computed, additional constraints imposed by rule s conditions section will be verified MIPRO 2015/ISS 1547

5 for every candidate rule (this step is a subject to optimization). Each condition consists of number of expressions of the form (relational-operator value selector), e.g. (<= a[year = 2011 and journal.name like "Int.*J.*"].issue 2) Such expression can be translated into SQL statement naturally. Dots correspond to table joins, and filtering constraints yield conditions in WHERE clause of the SQL query. Consequently, whole constraints section may be represented as an SQL query. Let us recall that access is granted if and only if there exists at least one positive rule and there are no negative rules for given user, object, and operation. Final decision can be trivially made on basis of applicable rule set. If there exist an applicable rule that denies access, then the finial decision is negative. Otherwise, the decision is positive if an only if the set of applicable rules is not empty. Our proof of concept implementation supports automatic generation of SQL queries for checking rule s conditions and user s membership in parameterized roles. Checking that a rule matches request parameters is performed in statically defined order. First, matching between request s and rule s object and operation is validated. If this string equality check succeeded, role membership and additional access conditions are validated. This order based on assumption that last check is more complex and time consuming, because corresponding SQL query generated from a potentially complex expression. As long as the number of rules associated with each object and operation pair is small, this simple strategy produces reasonable performance: checking one or two extra rules yields only a couple of extra SQL queries. In general, one can expect that the number of rules will increase over time, so more sophisticated algorithm has to be developed. In the rest of this section we discuss possible improved to the described simple strategy. One possible approach to performance optimization based on the observation that, if the access was granted, then all candidates for applicable negative rules had to be checked. It is worth noting that long lists of negative rules could be inefficient in principle. Positive candidate rules have to be checked only until first match occurrence. Choosing the right order of search space exploration can speed up overall performance. Preference may be given to rules that do not require to much time to verify, and yield positive result with high frequency. Both values may be estimated using statistics of previous calls to the same rule. Frequency of positive results reflects the quantity of objects satisfying rule s conditions. Other directions of optimization include: choosing the right order of conditions processing, based on the similar statistics on hit rate and efficiency of SQL queries, and finding common sub-queries in rules and organize rules hierarchically. The latter approach is related to view selection techniques in relational database that allow to identify frequently used patterns in a set of queries. If conditions, or parts of conditions, of two or more rules are similar, they are probably may by approximated from above (with false positives) by a single query. If this generalized query produces negative result, then none of dependent rules can not be evaluated to positive result. Otherwise, some compensation queries are to be evaluated. B. Policy Validation Static validation of security policy is one of the goals of our work. In distributed environment searching for possible conflicts between access rules created by independent administrators is extremely important. Conflicts of two types are possible. Explicit conflict: there exists a triplet (user, object, operation) and two applicable rules such that one rule is positive, and the other one is negative. Implicit conflict: there exists an object, user, and applicable positive rule defined by a subordinate policy writer, such that there exists no applicable positive rule defined by a higher level administrator. Both types of conflicts can be detected at runtime. Dynamic detection is, certainly, a useful feature in practice, but static analysis is required for elimination of possible errors in advance. Methods for static analysis of access control systems were developed for classical RBAC model, e.g. [11], [12]. In [11] authors consider similar problem of collaborative editing of security policy under Administrative RBAC model. The decision problem in this case consists of establishing if a user can be assigned to certain role by a sequence of administrative actions. The problem is reduced to the reachability problem in some infinite transition system. Decision problems for attribute-based models should be harder because wider range of objects should be considered. Searching for explicit conflicts in some cases may be reduces to a well studied NP-complete problem of checking containment of conjunctive query in a union of conjunctive queries [14]. Indeed, suppose we are checking one particular rule for consistence with a policy. A conflict appears if a conjunctive query corresponding to the rule under consideration is not contained in union of all other queries generated by rules defined for the same object. In a more general case, policy checking problem may be reduced to a problem similar to [15]. A conflict appears if some counter-example object can be constructed under the specified policy. V. CONCLUSION In this paper a very basic role-centric attribute-based access control framework, motivated by the development of a real distributed application, is presented. It is targeted to support RESTful web application where each request is treated independently from all previous requests from the same user MIPRO 2015/ISS

6 Attribute-based rules restrict permissions assigned to parameterized roles. Additional constraints, specifying whether or not a rule is applicable to the request, are stated in an XPathlike language that automatically mapped into SQL statements during access checking stage. As access control rules are defined using special language, automated policy validation is possible. We briefly describe possible research directions in the areas of efficient implementation of decision procedure and static policy validation. Despite principal inefficiency of some operation, such as checking an access in presence of large number of negative rules, we believe that the described framework, which is in the very early stage of development at the moment, may be used in wider class of web-based application. REFERENCES [1] D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, A role-based access control model and reference implementation within a corporate intranet, ACM Trans. Inf. Syst. Secur., vol. 2, no. 1, pp , Feb [Online]. Available: [2] D. R. Kuhn, E. J. Coyne, and T. R. Weil, Adding attributes to rolebased access control, Computer, no. 6, pp , [3] X. Jin, R. Sandhu, and R. Krishnan, RABAC: Role-centric attributebased access control, in Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security, ser. MMM- ACNS 12. Berlin, Heidelberg: Springer-Verlag, 2012, pp [Online]. Available: 8 [4] X. Jin, R. Krishnan, and R. Sandhu, A unified attribute-based access control model covering DAC, MAC and RBAC, in Data and Applications Security and Privacy XXVI, ser. Lecture Notes in Computer Science, N. Cuppens-Boulahia, F. Cuppens, and J. Garcia- Alfaro, Eds. Springer Berlin Heidelberg, 2012, vol. 7371, pp [Online]. Available: 4 [5] J. Fischer, D. Marino, R. Majumdar, and T. Millstein, Finegrained access control with object-sensitive roles, in ECOOP 2009 Object-Oriented Programming, ser. Lecture Notes in Computer Science, S. Drossopoulou, Ed. Springer Berlin Heidelberg, 2009, vol. 5653, pp [Online]. Available: [6] B. Carminati, E. Ferrari, and A. Perego, Rule-based access control for social networks, in On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, ser. Lecture Notes in Computer Science, R. Meersman, Z. Tari, and P. Herrero, Eds. Springer Berlin Heidelberg, 2006, vol. 4278, pp [Online]. Available: 80 [7] B. Lang, I. Foster, F. Siebenlist, R. Ananthakrishnan, and T. Freeman, A flexible attribute based access control method for grid computing, Journal of Grid Computing, vol. 7, no. 2, pp , [Online]. Available: [8] E. Yuan and J. Tong, Attributed based access control (ABAC) for Web services, in Web Services, ICWS Proceedings IEEE International Conference on, July 2005, pp [9] J. Crampton and J. Sellwood, Path conditions and principal matching: A new approach to access control, in Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, ser. SACMAT 14. New York, NY, USA: ACM, 2014, pp [Online]. Available: [10] G. Motta and S. Furuie, A contextual role-based access control authorization model for electronic patient record, Information Technology in Biomedicine, IEEE Transactions on, vol. 7, no. 3, pp , Sept [11] S. Ranise, A. Truong, and A. Armando, Boosting model checking to analyse large ARBAC policies, in Security and Trust Management, ser. Lecture Notes in Computer Science, A. Jsang, P. Samarati, and M. Petrocchi, Eds. Springer Berlin Heidelberg, 2013, vol. 7783, pp [Online]. Available: [12] M. Pistoia, S. Fink, R. Flynn, and E. Yahav, When role models have flaws: Static validation of enterprise security policies, in Software Engineering, ICSE th International Conference on, May 2007, pp [13] S. Afonin, A. Kozitsyn, and I. Astapov, SQLReports: Yet another relational database reporting system, in Proceedings of the 9th International Conference on Software Engineering and Applications, 2014, pp [14] Y. E. Ioannidis and R. Ramakrishnan, Containment of conjunctive queries: Beyond relations as sets, ACM Trans. Database Syst., vol. 20, no. 3, pp , Sep [Online]. Available: [15] N. Moore, Computational complexity of the problem of tree generation under fine-grained access control policies, Information and Computation, vol. 209, no. 3, pp , 2011, special Issue: 3rd International Conference on Language and Automata Theory and Applications (LATA 2009). [Online]. Available: MIPRO 2015/ISS 1549

Integrating Attributes into Role-Based Access Control

Integrating Attributes into Role-Based Access Control Integrating Attributes into Role-Based Access Control Qasim Mahmood Rajpoot 1(B), Christian Damsgaard Jensen 1, and Ram Krishnan 2 1 Department of Applied Mathematics and Computer Science, Technical University

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Completeness, Versatility, and Practicality in Role Based Administration

Completeness, Versatility, and Practicality in Role Based Administration Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović svuk002@ec.auckland.ac.nz Abstract Applying role based administration to role based access control systems has

More information

Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions

Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische

More information

On XACML, role-based access control, and health grids

On XACML, role-based access control, and health grids On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and

More information

Attributes Enhanced Role-Based Access Control Model

Attributes Enhanced Role-Based Access Control Model Attributes Enhanced Role-Based Access Control Model Qasim Mahmood Rajpoot 1, Christian Damsgaard Jensen 1 and Ram Krishnan 2 1 Department of Applied Mathematics & Computer Science Technical University

More information

Access Control of Cloud Service Based on UCON

Access Control of Cloud Service Based on UCON Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China chendw@njupt.edu.cn,

More information

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell

1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:

More information

Data Model Bugs. Ivan Bocić and Tevfik Bultan

Data Model Bugs. Ivan Bocić and Tevfik Bultan Data Model Bugs Ivan Bocić and Tevfik Bultan Department of Computer Science University of California, Santa Barbara, USA bo@cs.ucsb.edu bultan@cs.ucsb.edu Abstract. In today s internet-centric world, web

More information

A logical approach to dynamic role-based access control

A logical approach to dynamic role-based access control A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control

More information

Role Based Access Control (RBAC) Nicola Zannone

Role Based Access Control (RBAC) Nicola Zannone Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access

More information

On the Security of Delegation in Access Control Systems

On the Security of Delegation in Access Control Systems On the Security of Delegation in Access Control Systems Qihua Wang, Ninghui Li, and Hong Chen Department of Computer Science, Purdue University {wangq, ninghui, chen131}@cs.purdue.edu Abstract. Delegation

More information

Administration of Access Control in Information Systems Using URBAC Model

Administration of Access Control in Information Systems Using URBAC Model JOURNAL OF APPLIED COMPUTER SCIENCE Vol. 19 No. 2 (2011), pp. 89-109 Administration of Access Control in Information Systems Using URBAC Model Aneta Poniszewska-Marańda Institute of Information Technology

More information

Purpose-Centric Secure Information Sharing

Purpose-Centric Secure Information Sharing Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security (ICS) University of Texas at San Antonio September 2009 ravi.sandhu@utsa.edu

More information

Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment

Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment Implementation of an Efficient RBAC Technique of Cloud Computing in.net Environment Ruhi Gupta Department Of Computer Science, Punjabi University, Patiala, India Abstract: Cloud Computing is flourishing

More information

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model that Extends NIST RBAC S. Berhe 1, S. Demurjian 1, S. Gokhale 1, J. Pavlich-Mariscal 2,3,

More information

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS

CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,

More information

Using XACML Policies as OAuth Scope

Using XACML Policies as OAuth Scope Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe

More information

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments

Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology

More information

Management of Exceptions on Access Control Policies

Management of Exceptions on Access Control Policies Management of Exceptions on Access Control Policies J. G. Alfaro 1,2, F. Cuppens 1, and N. Cuppens-Boulahia 1 1 GET/ENST-Bretagne, 35576 Cesson Sévigné - France, {frederic.cuppens,nora.cuppens}@enst-bretagne.fr

More information

XML DATA INTEGRATION SYSTEM

XML DATA INTEGRATION SYSTEM XML DATA INTEGRATION SYSTEM Abdelsalam Almarimi The Higher Institute of Electronics Engineering Baniwalid, Libya Belgasem_2000@Yahoo.com ABSRACT This paper describes a proposal for a system for XML data

More information

CHAPTER THREE, Network Services Management Framework

CHAPTER THREE, Network Services Management Framework CHAPTER THREE, Acronyms and Terms 3-3 List of Figures 3-4 1 Introduction 3-5 2 Architecture 3-6 2.1 Entity Identification & Addressing 3-7 2.2 Management Domain Registration and Information Service 3-7

More information

KNOWLEDGE FACTORING USING NORMALIZATION THEORY

KNOWLEDGE FACTORING USING NORMALIZATION THEORY KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09

More information

Improving SQL Server Performance

Improving SQL Server Performance Informatica Economică vol. 14, no. 2/2010 55 Improving SQL Server Performance Nicolae MERCIOIU 1, Victor VLADUCU 2 1 Prosecutor's Office attached to the High Court of Cassation and Justice 2 Prosecutor's

More information

Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications

Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Design and Evaluation of a Hierarchical Multi-Tenant Data Management Framework for Cloud Applications Pieter-Jan Maenhaut, Hendrik Moens, Veerle Ongenae and Filip De Turck Ghent University, Faculty of

More information

ICAB4136B Use structured query language to create database structures and manipulate data

ICAB4136B Use structured query language to create database structures and manipulate data ICAB4136B Use structured query language to create database structures and manipulate data Release: 1 ICAB4136B Use structured query language to create database structures and manipulate data Modification

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model

Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model , pp.126-131 http://dx.doi.org/10.14257/astl.2013.29.26 Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model Shu-Ping Lu 1, Kuei-Kai Shao 1, Yu-Nung Chao 1, Kuo-Shu Luo

More information

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL

Using Patterns and Composite Propositions to Automate the Generation of Complex LTL University of Texas at El Paso DigitalCommons@UTEP Departmental Technical Reports (CS) Department of Computer Science 8-1-2007 Using Patterns and Composite Propositions to Automate the Generation of Complex

More information

A Scala DSL for Rete-based Runtime Verification

A Scala DSL for Rete-based Runtime Verification A Scala DSL for Rete-based Runtime Verification Klaus Havelund Jet Propulsion Laboratory California Institute of Technology, California, USA Abstract. Runtime verification (RV) consists in part of checking

More information

MARAH: an RBAC model and its integration in a Web server

MARAH: an RBAC model and its integration in a Web server MARAH: an RBAC model and its integration in a Web server P. Díaz, D. Sanz & I. Aedo Departamento de Informática, Universidad Carlos III de Madrid Abstract Hypermedia systems, whether implemented as web

More information

Role-Based Access Control Requirements Model with Purpose Extension

Role-Based Access Control Requirements Model with Purpose Extension Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

2. Basic Relational Data Model

2. Basic Relational Data Model 2. Basic Relational Data Model 2.1 Introduction Basic concepts of information models, their realisation in databases comprising data objects and object relationships, and their management by DBMS s that

More information

Web Service Authorization Framework

Web Service Authorization Framework Web Service Authorization Framework Thomas Ziebermayr, Stefan Probst Software Competence Center Hagenberg, Hauptstrasse 99, 4232 Hagenberg, Austria thomas.ziebermayr@scch.at, stefan.probst@scch.at Abstract

More information

SQL Server. 1. What is RDBMS?

SQL Server. 1. What is RDBMS? SQL Server 1. What is RDBMS? Relational Data Base Management Systems (RDBMS) are database management systems that maintain data records and indices in tables. Relationships may be created and maintained

More information

CHAPTER 22 Database Security Integration Using Role-Based Access Control

CHAPTER 22 Database Security Integration Using Role-Based Access Control CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 svlvia@csd.uwo.ca

More information

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2

Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System

More information

www.gr8ambitionz.com

www.gr8ambitionz.com Data Base Management Systems (DBMS) Study Material (Objective Type questions with Answers) Shared by Akhil Arora Powered by www. your A to Z competitive exam guide Database Objective type questions Q.1

More information

Data Validation with OWL Integrity Constraints

Data Validation with OWL Integrity Constraints Data Validation with OWL Integrity Constraints (Extended Abstract) Evren Sirin Clark & Parsia, LLC, Washington, DC, USA evren@clarkparsia.com Abstract. Data validation is an important part of data integration

More information

A Survey on Administrative Policies in Rule- Based Access Control

A Survey on Administrative Policies in Rule- Based Access Control A Survey on Administrative Policies in Rule- Based Access Control Thirunavukkarasu S PG scholar, Maharaja Engineering College, Avinashi, India. arasu33@gmail.com S.Umarani Assistant Professor, Maharaja

More information

Determination of the normalization level of database schemas through equivalence classes of attributes

Determination of the normalization level of database schemas through equivalence classes of attributes Computer Science Journal of Moldova, vol.17, no.2(50), 2009 Determination of the normalization level of database schemas through equivalence classes of attributes Cotelea Vitalie Abstract In this paper,

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls

Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls Machon Gregory Peter Loscocco mbgrego@tycho.nsa.gov loscocco@tycho.nsa.gov National Security Agency Abstract Risk Adaptable

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

A Meeting Room Scheduling Problem

A Meeting Room Scheduling Problem A Scheduling Problem Objective Engineering, Inc. 699 Windsong Trail Austin, Texas 78746 512-328-9658 FAX: 512-328-9661 ooinfo@oeng.com http://www.oeng.com Objective Engineering, Inc., 1999-2007. Photocopying,

More information

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Access Control Models Part I. Murat Kantarcioglu UT Dallas UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:

More information

Identity Management and Access Control

Identity Management and Access Control and Access Control Marek Rychly mrychly@strathmore.edu Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly

More information

OPTIMIZING QUERIES IN SQL SERVER 2008

OPTIMIZING QUERIES IN SQL SERVER 2008 Scientific Bulletin Economic Sciences, Vol. 9 (15) - Information technology - OPTIMIZING QUERIES IN SQL SERVER 2008 Professor Ph.D. Ion LUNGU 1, Nicolae MERCIOIU 2, Victor VLĂDUCU 3 1 Academy of Economic

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques

Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Relational Databases

Relational Databases Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 18 Relational data model Domain domain: predefined set of atomic values: integers, strings,... every attribute

More information

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008

Security Test s i t ng Eileen Donlon CMSC 737 Spring 2008 Security Testing Eileen Donlon CMSC 737 Spring 2008 Testing for Security Functional tests Testing that role based security functions correctly Vulnerability scanning and penetration tests Testing whether

More information

1 File Processing Systems

1 File Processing Systems COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

Web Services: Role Based Access Control with Single Sign-on Architecture

Web Services: Role Based Access Control with Single Sign-on Architecture Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn gershteyn@gmail.com

More information

Toward Fine-grained Data-level Access Control Model for Multitenant

Toward Fine-grained Data-level Access Control Model for Multitenant , pp.79-88 http://dx.doi.org/0.4257/ ijgdc.204.7.2.08 Toward Fine-grained Data-level Access Control Model for Multitenant Applications Kun Ma, 3, Weijuan Zhang 2 and Zijie Tang 3 Shandong Provincial Key

More information

Integrating Pattern Mining in Relational Databases

Integrating Pattern Mining in Relational Databases Integrating Pattern Mining in Relational Databases Toon Calders, Bart Goethals, and Adriana Prado University of Antwerp, Belgium {toon.calders, bart.goethals, adriana.prado}@ua.ac.be Abstract. Almost a

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai

More information

- Table of Contents -

- Table of Contents - - Table of Contents - 1 INTRODUCTION... 1 1.1 TARGET READERS OF THIS DOCUMENT... 1 1.2 ORGANIZATION OF THIS DOCUMENT... 2 1.3 COMMON CRITERIA STANDARDS DOCUMENTS... 3 1.4 TERMS AND DEFINITIONS... 4 2 OVERVIEW

More information

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 chandramouli@nist.gov

More information

Towards an Access-Control Metamodel for Web Content Management Systems

Towards an Access-Control Metamodel for Web Content Management Systems Towards an Access-Control Metamodel for Web Content Management Systems Salvador Martínez 1, Joaquin Garcia-Alfaro 3, Frédéric Cuppens 2, Nora Cuppens-Boulahia 2 and Jordi Cabot 1 1 ATLANMOD, & École des

More information

On the Definition of Access Control Requirements for Grid and Cloud Computing Systems

On the Definition of Access Control Requirements for Grid and Cloud Computing Systems On the Definition of Access Control Requirements for Grid and Cloud Computing Systems Antonios Gouglidis and Ioannis Mavridis Department of Applied Informatics, University of Macedonia, 156 Egnatia Street,

More information

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems

A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

Generating SQL Queries Using Natural Language Syntactic Dependencies and Metadata

Generating SQL Queries Using Natural Language Syntactic Dependencies and Metadata Generating SQL Queries Using Natural Language Syntactic Dependencies and Metadata Alessandra Giordani and Alessandro Moschitti Department of Computer Science and Engineering University of Trento Via Sommarive

More information

BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm...

BUSINESS RULES CONCEPTS... 2 BUSINESS RULE ENGINE ARCHITECTURE... 4. By using the RETE Algorithm... 5. Benefits of RETE Algorithm... 1 Table of Contents BUSINESS RULES CONCEPTS... 2 BUSINESS RULES... 2 RULE INFERENCE CONCEPT... 2 BASIC BUSINESS RULES CONCEPT... 3 BUSINESS RULE ENGINE ARCHITECTURE... 4 BUSINESS RULE ENGINE ARCHITECTURE...

More information

II. PREVIOUS RELATED WORK

II. PREVIOUS RELATED WORK An extended rule framework for web forms: adding to metadata with custom rules to control appearance Atia M. Albhbah and Mick J. Ridley Abstract This paper proposes the use of rules that involve code to

More information

Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud

Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud Dissertation Defense Xin Jin Advisor: Dr. Ravi Sandhu Co-Advisor: Dr. Ram Krishnan Dr. Rajendra V. Boppana Dr. Hugh

More information

Semantic-ontological combination of Business Rules and Business Processes in IT Service Management

Semantic-ontological combination of Business Rules and Business Processes in IT Service Management Semantic-ontological combination of Business Rules and Business Processes in IT Service Management Alexander Sellner 1, Christopher Schwarz 1, Erwin Zinser 1 1 FH JOANNEUM University of Applied Sciences,

More information

Implement role based access control with attribute certificates

Implement role based access control with attribute certificates Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany zhouwei48@hotmail.com Christoph Meinel Computer Science Department

More information

An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams

An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams An XML Framework for Integrating Continuous Queries, Composite Event Detection, and Database Condition Monitoring for Multiple Data Streams Susan D. Urban 1, Suzanne W. Dietrich 1, 2, and Yi Chen 1 Arizona

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Oracle Database: SQL and PL/SQL Fundamentals NEW

Oracle Database: SQL and PL/SQL Fundamentals NEW Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals

More information

sql-schema-comparer: Support of Multi-Language Refactoring with Relational Databases

sql-schema-comparer: Support of Multi-Language Refactoring with Relational Databases sql-schema-comparer: Support of Multi-Language Refactoring with Relational Databases Hagen Schink Institute of Technical and Business Information Systems Otto-von-Guericke-University Magdeburg, Germany

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming

More information

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152 Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD

More information

Business Application Services Testing

Business Application Services Testing Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load

More information

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,

More information

IT2305 Database Systems I (Compulsory)

IT2305 Database Systems I (Compulsory) Database Systems I (Compulsory) INTRODUCTION This is one of the 4 modules designed for Semester 2 of Bachelor of Information Technology Degree program. CREDITS: 04 LEARNING OUTCOMES On completion of this

More information

Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability

Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability White Paper Application Centric Infrastructure Object-Oriented Data Model: Gain Advanced Network Control and Programmability What You Will Learn This document discusses application centric infrastructure

More information

QUT Digital Repository: http://eprints.qut.edu.au/

QUT Digital Repository: http://eprints.qut.edu.au/ QUT Digital Repository: http://eprints.qut.edu.au/ Alhaqbani, Bandar S. and Fidge, Colin J. (2007) Access Control Requirements for Processing Electronic Health Records. In ter Hofstede, A. and Benatallah,

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

The Import & Export of Data from a Database

The Import & Export of Data from a Database The Import & Export of Data from a Database Introduction The aim of these notes is to investigate a conceptually simple model for importing and exporting data into and out of an object-relational database,

More information

estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS

estatistik.core: COLLECTING RAW DATA FROM ERP SYSTEMS WP. 2 ENGLISH ONLY UNITED NATIONS STATISTICAL COMMISSION and ECONOMIC COMMISSION FOR EUROPE CONFERENCE OF EUROPEAN STATISTICIANS Work Session on Statistical Data Editing (Bonn, Germany, 25-27 September

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2004 Vol. 3, no. 3, March-April 2004 L n RBAC: A Multiple-Levelled Role- Based Access

More information

Integration of Application Business Logic and Business Rules with DSL and AOP

Integration of Application Business Logic and Business Rules with DSL and AOP Integration of Application Business Logic and Business Rules with DSL and AOP Bogumiła Hnatkowska and Krzysztof Kasprzyk Wroclaw University of Technology, Wyb. Wyspianskiego 27 50-370 Wroclaw, Poland Bogumila.Hnatkowska@pwr.wroc.pl

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems

Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems ehealth Beyond the Horizon Get IT There S.K. Andersen et al. (Eds.) IOS Press, 2008 2008 Organizing Committee of MIE 2008. All rights reserved. 679 Context-Aware Access Control for Pervasive Access to

More information

Requirements for Software Deployment Languages and Schema

Requirements for Software Deployment Languages and Schema Requirements for Software Deployment Languages and Schema Richard S. Hall, Dennis Heimbigner, Alexander L. Wolf Software Engineering Research Laboratory Department of Computer Science University of Colorado

More information

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation

Objectives. Distributed Databases and Client/Server Architecture. Distributed Database. Data Fragmentation Objectives Distributed Databases and Client/Server Architecture IT354 @ Peter Lo 2005 1 Understand the advantages and disadvantages of distributed databases Know the design issues involved in distributed

More information

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY

INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY INTRUSION PROTECTION AGAINST SQL INJECTION ATTACKS USING REVERSE PROXY Asst.Prof. S.N.Wandre Computer Engg. Dept. SIT,Lonavala University of Pune, snw.sit@sinhgad.edu Gitanjali Dabhade Monika Ghodake Gayatri

More information

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis

Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen

More information

Role-based Authorization Constraints Specification Using Object Constraint Language

Role-based Authorization Constraints Specification Using Object Constraint Language Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte gahn@uncc.edu Michael. E. Shin

More information

A Comparison of Database Query Languages: SQL, SPARQL, CQL, DMX

A Comparison of Database Query Languages: SQL, SPARQL, CQL, DMX ISSN: 2393-8528 Contents lists available at www.ijicse.in International Journal of Innovative Computer Science & Engineering Volume 3 Issue 2; March-April-2016; Page No. 09-13 A Comparison of Database

More information

Oracle Database: SQL and PL/SQL Fundamentals NEW

Oracle Database: SQL and PL/SQL Fundamentals NEW Oracle University Contact Us: + 38516306373 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals training delivers the

More information

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds

Distributed Attribute Based Encryption for Patient Health Record Security under Clouds Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained

More information

UML-based Test Generation and Execution

UML-based Test Generation and Execution UML-based Test Generation and Execution Jean Hartmann, Marlon Vieira, Herb Foster, Axel Ruder Siemens Corporate Research, Inc. 755 College Road East Princeton NJ 08540, USA jeanhartmann@siemens.com ABSTRACT

More information