Abstract
Access control models play an important role in database management systems. In general, there are three basic access control models: Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Non-Discretionary Access Control (NAC). Currently, the majority of commercial DBMSs provide only DAC, and some temporal access control models have been derived based on either DAC or NAC. In the context of video database applications, since the structure of video data is complex in nature, it requires a specific and tailor-made access control mechanism which should include MAC as well as DAC and NAC. However, only few efforts have been put on access control models for video database systems. In this paper, a transitive and temporal access control mechanism for collaborative video database production applications has been proposed, which subsumes the properties of DAC, MAC, and NAC. Moreover, our proposed mechanism is integrated with the intellectual property concerns by constructing an access control hierarchy of video data with authorization rules. In particular, our mechanism can derive novel authorization rules not only on conventional client-data access control, but also on data–data access control. Besides video data, the proposed model is applicable to other data types which exhibit a hierarchical data structure.
Similar content being viewed by others
References
Adam NR, Atluri V, Bertino E, Ferrari E (2002) A content-based authorization model for digital libraries. IEEE Trans Knowl Data Eng 14(2):296–315
Aref WG, Catlin AC, Fan J, Elmagarmid AK, Hammad MA, Ilyas IF, Marzouk MS, Zhu X (2002) A video database management system for advancing video database research, Proceedings of the International Workshop on Multimedia Information Systems (MIS 2002), Tempe, Arizona, USA, Oct. 30–Nov. 1
Bertino E, Bettini C, Ferrari E, Samarati P (1996) A temporal access control mechanism for database systems. IEEE Trans Knowl Data Eng 8(1):67–80
Bertino E, Bettini C, Ferrari E, Samarati P (1998) An access control model supporting periodicity constraints and temporal reasoning. ACM Trans Database Syst 23(3):231–285
Bertino E, Bonatti PA, Ferrari E (2001) TRBAC: a temporal role-based access control. ACM Trans Inf Syst Secur 4(3):191–233
Bertino E, Fan J, Ferrari E, Hacid M-S, Elmagarmid AK, Zhu X (2003) A hierarchical access control model for video database systems. ACM Trans Inf Sys 21(2):155–191
Bertino E, Hammad MA, Aref WG, Elmagarmid AK (2000) An access control model for video database systems. In: Agah A, Callan J, Rundensteiner E (eds) Proceedings of the ACM International Conference on Information and Knowledge Management (CIKM 2000), McLean, Virginia, USA, Nov. 6–11
Chan SSM, Li Q, Wu Y, Zhuang Y (2002) Accommodating hybrid retrieval in a comprehensive video database management system. IEEE Trans Multimedia 4(2):146–159, June
Ellis CA, Gibbs SJ, Rein GL (1991) Groupware: some issues and experiences. Commun ACM 34(1):39–58, Jan
Guerrero LA, Fuller DA (2001) A pattern system for the development of collaborative applications. Inf Softw Technol 43(7):457–467, May
Role-based Access Control, http://csrc.nist.gov/rbac/
Proceedings of the 1st ACM Workshop on Role-based Access Control (RBAC 1995), Gaithersburg, Maryland, USA, Nov. 20–Dec. 2, 1995
Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC 1997), Fairfax, Virginia, USA, Nov. 6–7, 1997
Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC 1998), Fairfax, Virginia, USA, Oct. 22–23, 1998
Proceedings of the 4th ACM Workshop on Role-Based Access Control (RBAC 1999), Fairfax, Virginia, USA, Oct. 28–29, 1999
Proceedings of the 5th ACM Workshop on Role-based Access Control (RBAC 2000), Berlin, Germany, July 26–28, 2000
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, 2001
Sandhu RS (1998) Role-based access control, advances in computers: the engineering of large systems. In: Zelkowitz MV (ed) Academic, pp 238–285, September
Sandhu RS (2001) Future directions in role-based access control models. In: Gorodetski VI, Skormin VA, Popyack LJ (eds) Proceedings of the international workshop on information assurance in computer networks: Methods, Models, and Architectures for Network Security (MMM-ACNS 2001), LNCS 2052, St. Petersburg, Russia, May 21–23, pp 22–26
Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29(2):38–47
Zhao B (2001) Collaborative access control, Article in T-110.501 Seminar on Network Security 2001 (NetSec 2001), Publications in Telecommunications Software and Multimedia Laboratory, Helsinki University of Technology
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chan, S.S.M., Li, Q. & Pino, J.A. VideoAcM: a transitive and temporal access control mechanism for collaborative video database production applications. Multimed Tools Appl 29, 29–53 (2006). https://doi.org/10.1007/s11042-006-7812-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-006-7812-8