An authorization model for query execution in the cloud
نویسندگان
چکیده
We present a novel approach for the specification and enforcement of authorizations that enables controlled data sharing collaborative queries in cloud. Data authorities can establish regulating access to their distinguishing three visibility levels (no visibility, encrypted plaintext visibility). Authorizations are enforced accounting information content carried computation ensure no is improperly leaked adjusting on-the-fly. Assignment operations subjects takes into consideration cost operation execution as well encryption/decryption needed make assignment authorized. Our users fully enjoy benefits economic savings competitive open cloud market, while maintaining control over data.
منابع مشابه
an application of equilibrium model for crude oil tanker ships insurance futures in iran
با توجه به تحریم های بین المملی علیه صنعت بیمه ایران امکان استفاده از بازارهای بین المملی بیمه ای برای نفتکش های ایرانی وجود ندارد. از طرفی از آنجایی که یکی از نوآوری های اخیر استفاده از بازارهای مالی به منظور ریسک های فاجعه آمیز می باشد. از اینرو در این پایان نامه سعی شده است با استفاده از این نوآوری ها با طراحی اوراق اختیارات راهی نو جهت بیمه گردن نفت کش های ایرانی ارائه نمود. از آنجایی که بر...
an appropriate model for exchange rate predictability in iran: comparing potential forecastability
nowadays in trade and economic issues, prediction is proposed as the most important branch of science. existence of effective variables, caused various sectors of the economic and business executives to prefer having mechanisms which can be used in their decisions. in recent years, several advances have led to various challenges in the science of forecasting. economical managers in various fi...
A Model for Pipelined Query Execution
This paper develops an analytical model for pipelined execution of complex queries. The goal of this research is gaining insight in potential performance gain from the concurrent execution of pipelined relational operations. First, the model is developed in general terms, and after that it is elaborated for selection, unique, and join operations. Finally, it is shown how the model is used to un...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملOCL as the Query Language for UML Model Execution
Despite the specification of OCL mentions “query language” as one of its possible applications, there are rather few efforts in that direction. However, the problem becomes central where applying MDA to data intensive application modelling is considered. Recently added UML elements of Actions and Structured Activities make it possible to represent a level of detail similar to the one of common ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Vldb Journal
سال: 2021
ISSN: ['0949-877X', '1066-8888']
DOI: https://doi.org/10.1007/s00778-021-00709-x