skip to main content
10.1145/1455770.1455808acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A formal framework for reflective database access control policies

Published: 27 October 2008 Publication History

Abstract

Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions between data managed by different users, and can lead to unexpected results if not carefully written and analyzed. We propose the use of Transaction Datalog as a formal framework for expressing reflective access control policies. We demonstrate how it provides a basis for analyzing certain types of policies and enables secure implementations that can guarantee that configurations built on these policies cannot be subverted.

References

[1]
S. Abiteboul and V. Vianu. Datalog extensions for database queries and updates. Journal of Computer and System Sciences, 43(1):62--124, Aug. 1991.
[2]
R. Agrawal, P. Bird, T. Grandison, J. Kiernan, S. Logan, and W. Rjaibi. Extending relational database systems to automatically enforce privacy policies. In ICDE 05, Tokyo, Japan, Apr. 2005.
[3]
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In VLDB '02, Hong Kong, China, Aug. 2002.
[4]
M. Ancona, W. Cazzola, and E.B. Fernandez. A history-dependent access control mechanism using reflection. In MOS '99, Lisbon, Portugal, Jun. 1999.
[5]
F. Bancilhon and R. Ramakrishnan. An amateur's introduction to recursive query processing strategies. In SIGMOD '86, Washington, DC, May 1986.
[6]
R. Bobba, O. Fatemieh, F. Khan, C.A. Gunter, and H. Khurana. Using attribute-based access control to enable attribute-based messaging. In ACSAC '06, Miami Beach, FL, Dec. 2006.
[7]
A.J. Bonner. Transaction datalog: A compositional language for transaction programming. Lecture Notes in Computer Science, 1369:373--395, 1998.
[8]
A.J. Bonner. Workflow, transactions, and datalog. In PODS '99, Philadelphia, PA, Jun. 1999.
[9]
D.F.C. Brewer and M.J. Nash. The chinese wall security policy. In IEEE Security and Privacy, Oakland, CA, May 1989.
[10]
S. Chaudhuri, T. Dutta, and S. Sudarshan. Fine grained authorization through predicated grants. In ICDE '07, Istanbul, Turkey, Apr. 2007.
[11]
W.R. Cook and M.R. Gannholm. Rule based database security system and method. United States Patent 6,820,082, Nov. 2004.
[12]
S. Etalle and W.H. Winsborough. A posteriori compliance control. In SACMAT '07, Sophia Antipolis, France, Jun. 2007.
[13]
H. Gallaire, J. Minker, and J.-M. Nicolas. Logic and databases: A deductive approach. ACM Computing Surveys, 16(2):153--185, Jun. 1984.
[14]
R. Goodwin, S. Goh, and F.Y. Wu. Instance-level access control for business-to-business electronic commerce. IBM Systems Journal, 41(2):303--321, 2002.
[15]
P.P. Griffiths and B.W. Wade. An authorization mechanism for a relational database system. In TODS, 1(3):242--255, Sep. 1976.
[16]
C.A. Gunter and T. Jim. Policy-directed certificate retrieval. Software-Practice and Experience, 30(15):1609--1640, 2000.
[17]
M.A. Harrison and W.L. Ruzzo. Monotonic protection systems. In Foundations of Secure Computation, pages 337--363. Academic Press, 1978.
[18]
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461--471, 1976.
[19]
S. Jha, N. Li, M.V. Tripunitara, Q. Wang, and W.H. Winsborough. Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing (TDSC). Submitted, under review.
[20]
T. Jim. SD3: A trust management system with certified evaluation. In IEEE Security and Privacy, Oakland, CA, May 2001.
[21]
G. Kabra, R. Ramamurthy, and S. Sudarshan. Redundancy and information leakage in fine-grained access control. In SIGMOD '06, Chicago, IL, Jun. 2006.
[22]
L. Lamport. The temporal logic of actions. ACM Transactions on Programming Languages and Systems, 16(3):872--923, 1994.
[23]
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D.J. DeWitt. Limiting disclosure in hippocratic databases. In VLDB '04, Toronto, ON, Aug. 2004.
[24]
N. Li and M.V. Tripunitara. On safety in discretionary access control. In IEEE Security and Privacy, Oakland, CA, May 2005.
[25]
P. Maes. Concepts and experiments in computational reflection. In OOPSLA '87, Orlando, FL, Oct. 1987.
[26]
Oracle Corporation. Oracle Virtual Private Database. Technical report, Oracle Corporation, Jun. 2005. http://www.oracle.com/technology/deploy/security/db_security/virtual-pr%ivate-database/index.html.
[27]
Oracle Corporation. Oracle service request number 5973395.992. Technical support communication, Jan. 2007.
[28]
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for fine-grained access control. In SIGMOD '04, Paris, France, Jun. 2004.
[29]
A. Rosenthal and E. Sciore. Extending SQL's grant and revoke operations, to limit and reactivate privileges. In DBSec '00, Schoorl, The Netherlands, Aug. 2000.
[30]
A. Rosenthal and E. Sciore. Abstracting and refining authorization in SQL. In Secure Data Management Workshop (SDM), Toronto, ON, Aug. 2004.
[31]
K.A. Ross. Modular stratification and magic sets for datalog programs with negation. Journal of the ACM, 41(6):1216--1266, Nov. 1994.
[32]
J.A. Solworth and R.H. Sloan. A layered design of discretionary access controls with decidable safety properties. In IEEE Security and Privacy, Oakland, CA, May 2004.
[33]
Sybase, Inc. New security features in Sybase Adaptive Server Enterprise. Technical report, Sybase, Inc., 2003. http://www.sybase.com/content/1013009/new_security_wp.pdf.
[34]
M.H. van Emden and R.A. Kowalski. The semantics of predicate logic as a programming language. Journal of the ACM, 23(4):733--742, 1976.
[35]
I. Welch and F. Lu. Policy-driven reflective enforcement of security policies. In SAC '06, Dijon, France, Apr. 2006.

Cited By

View all
  • (2023)Efficiently Supporting Attribute-Based Access Control in Relational Databases2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00037(230-239)Online publication date: 1-Nov-2023
  • (2015)Management of Authorization Rules Using Conceptual ModelProceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 110.5555/2814058.2814113(339-346)Online publication date: 26-May-2015
  • (2015)Collaborative Access Control in WebdamLogProceedings of the 2015 ACM SIGMOD International Conference on Management of Data10.1145/2723372.2749433(197-211)Online publication date: 27-May-2015
  • Show More Cited By

Index Terms

  1. A formal framework for reflective database access control policies

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '08: Proceedings of the 15th ACM conference on Computer and communications security
      October 2008
      590 pages
      ISBN:9781595938107
      DOI:10.1145/1455770
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. fine-grained access control
      2. formal safety verification
      3. reflective database access control
      4. transaction datalog

      Qualifiers

      • Research-article

      Conference

      CCS08
      Sponsor:

      Acceptance Rates

      CCS '08 Paper Acceptance Rate 51 of 280 submissions, 18%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 18 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Efficiently Supporting Attribute-Based Access Control in Relational Databases2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA58951.2023.00037(230-239)Online publication date: 1-Nov-2023
      • (2015)Management of Authorization Rules Using Conceptual ModelProceedings of the annual conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective - Volume 110.5555/2814058.2814113(339-346)Online publication date: 26-May-2015
      • (2015)Collaborative Access Control in WebdamLogProceedings of the 2015 ACM SIGMOD International Conference on Management of Data10.1145/2723372.2749433(197-211)Online publication date: 27-May-2015
      • (2015)Proceedings of the 2015 ACM SIGMOD International Conference on Management of DataundefinedOnline publication date: 27-May-2015
      • (2014)Explainable security for relational databasesProceedings of the 2014 ACM SIGMOD International Conference on Management of Data10.1145/2588555.2593663(1411-1422)Online publication date: 18-Jun-2014
      • (2013)Fine-grained disclosure control for app ecosystemsProceedings of the 2013 ACM SIGMOD International Conference on Management of Data10.1145/2463676.2467798(869-880)Online publication date: 22-Jun-2013
      • (2012)PlexCProceedings of the 17th ACM symposium on Access Control Models and Technologies10.1145/2295136.2295174(219-228)Online publication date: 20-Jun-2012
      • (2012)Integrating trust management and access control in data-intensive Web applicationsACM Transactions on the Web10.1145/2180861.21808636:2(1-43)Online publication date: 4-Jun-2012
      • (2012)Declarative privacy policyProceedings of the 2nd ACM SIGHIT International Health Informatics Symposium10.1145/2110363.2110401(323-332)Online publication date: 28-Jan-2012
      • (2012)Authorization Policies for Materialized ViewsInformation Security and Privacy Research10.1007/978-3-642-30436-1_43(525-530)Online publication date: 2012
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media