skip to main content
10.1145/1247480.1247596acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article

Flexible and efficient access control in oracle

Published: 11 June 2007 Publication History

Abstract

A single model for access control across the database and application server tiers is crucial to ensure consistent secure access to data in all the tiers. In this paper, we present the common model for access control within Oracle database and application tiers which is based on the standard WebDAV ACLs (Access Control Lists). Further, we discuss the flexible mechanisms for defining ACLs and associating them with data and various optimization techniques for efficiently evaluating ACLs in large scale enterprise applications.

References

[1]
Oracle Database Security Guide, Oracle RDBMS 10gR2.
[2]
HTTP Extensions for Distributed Authoring-WebDAV. RFC 2518. http://webdav.org
[3]
WebDAV Access Control Protocol. RFC 3744. http://webdav.org/acl
[4]
Network File System (NFS) version 4 Protocol. RFC 3530. http://www.ietf.org/rfc/rfc3744
[5]
Oracle XML DB Developer's Guide, Oracle RDBMS 10gR2.
[6]
R. Murthy, et al. Towards an enterprise XML architecture, SIGMOD 2005.
[7]
S. Rizvi, A. Mendelzon, S. Sudarshan, P. Roy. Extending Query Rewriting Techniques for Fine-Grained Access Control. SIGMOD 2004.
[8]
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2), 1996.
[9]
S. Castano, M. Fugini, G. Martella, and P. Samarati. Database Security. Addison-Wesley, 1995.
[10]
V. Gligor. Characteristics of role-based access control. In ACM Symp. on Access Control Models and Technologies, 1996.
[11]
A. Motro. An access authorization model for relational databases based on algebraic manipulation of view definitions. In ICDE, pages 339--347, 1989.
[12]
A. Motro. Panorama: A database system that annotates its answers to queries with their properties. Journal of Intelligent Information Systems, 7(1):51--73, Sept. 1996.
[13]
OASIS eXtensible Access Control Markup Language (XACML) TC. http://www.oasis-open.org/committees/xacml
[14]
D. F. Ferraiolo, D. R. Kuhn, R. Chandramouli, Role Based Access Control, Artech House, 2003.

Cited By

View all
  • (2015)Management of Authorization Rules Using Conceptual ModelProceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 110.5555/2814058.2814113(339-346)Online publication date: 26-May-2015
  • (2012)Integrating trust management and access control in data-intensive Web applicationsACM Transactions on the Web10.1145/2180861.21808636:2(1-43)Online publication date: 4-Jun-2012
  • (2010)Optimization of bulk operation performances within Oracle databaseIEEE 8th International Symposium on Intelligent Systems and Informatics10.1109/SISY.2010.5647277(163-167)Online publication date: Sep-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data
June 2007
1210 pages
ISBN:9781595936868
DOI:10.1145/1247480
  • General Chairs:
  • Lizhu Zhou,
  • Tok Wang Ling,
  • Program Chair:
  • Beng Chin Ooi
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 June 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ACL
  2. Oracle security model
  3. access control
  4. enterprise applications

Qualifiers

  • Article

Conference

SIGMOD/PODS07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Management of Authorization Rules Using Conceptual ModelProceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 110.5555/2814058.2814113(339-346)Online publication date: 26-May-2015
  • (2012)Integrating trust management and access control in data-intensive Web applicationsACM Transactions on the Web10.1145/2180861.21808636:2(1-43)Online publication date: 4-Jun-2012
  • (2010)Optimization of bulk operation performances within Oracle databaseIEEE 8th International Symposium on Intelligent Systems and Informatics10.1109/SISY.2010.5647277(163-167)Online publication date: Sep-2010
  • (2010)AccKWProceedings of the 6th international conference on Databases in Networked Information Systems10.1007/978-3-642-12038-1_8(107-121)Online publication date: 29-Mar-2010
  • (undefined)Quips, MD: Query Information Privacy and Security, for Medical DataSSRN Electronic Journal10.2139/ssrn.1357866

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media