Extended Authorization Policy for Graph-Structured Data
نویسندگان
چکیده
Abstract The high increase in the use of graph databases also for business- and privacy-critical applications demands a sophisticated, flexible, fine-grained authorization access control (AC) approach. Attribute-based (ABAC) supports definition rules policies. Attributes can be associated with subject, requested resource action, but environment. Thus, this is promising starting point. However, specific characteristics graph-structured data, such as attributes on vertices edges along path from given subject to accessed, are not yet considered. well-established eXtensible Access Control Markup Language (XACML), which defines declarative language fine-grained, attribute-based policies, basis our proposed approach—XACML Graph-structured data (XACML4G). additional path-specific constraints, described patterns, demand specialized processing policies well adapted enforcement decision-making process. To demonstrate XACML4G its process, we present scenario university domain. Due project’s environment, prototype built multi-model database ArangoDB. Finally, compliance quality standards systems administration assessed. results further studies concerning performance practice planned.
منابع مشابه
Querying Graph Structured Data
We present the architecture of an end-to-end semantic search engine that uses a graph data model to enable interactive query answering over structured and interlinked data collected from many disparate sources on the Web. In particular, we study distributed indexing methods for graphstructured data and parallel query evaluation methods on a cluster of computers. We evaluate the system on a data...
متن کاملExtension of Graph-Based Induction for General Graph Structured Data
A machine learning technique called Graph-Based Induction (GBI) e ciently extracts typical patterns from directed graph data by stepwise pair expansion (pairwise chunking). In this paper, we expand the capability of the Graph-Based Induction to handle not only tree structured data but also multi-inputs/outputs nodes and loop structure (including a self-loop) which cannot be treated in the conve...
متن کاملGrid Authorization Graph
The heterogeneous and dynamic nature of a grid environment demands a scalable authorization system. This brings out the need for a fast fine-grained access control mechanism for authorizing grid resources. Existing grid authorization systems adopt inefficient mechanisms for storing resources’ security policies. This leads to a large number of repetitions in checking security rules. One of the e...
متن کاملAn Extended Authorization Model for Relational Databases
We propose two extensions to the authorization model for relational databases defined originally by Griffiths and Wade. The first extension concerns a new type of revoke operation, called noncascading revoke operation. The original model contains a single, cascading revoke operation, meaning that when a privilege is revoked from a user, a recursive revocation takes place that deletes all author...
متن کاملEconomical Transformations of Structured Data (Extended Version)
Reliability of large-scale hardware and software systems often depends on the correctness of the underlying structured data. Examples of structured data include heap-allocated linked data structures, files, and program states in software, and netlists and simulator states for modeling hardware. In this paper, we focus on automatically transforming structured data to make it satisfy certain prop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: SN computer science
سال: 2021
ISSN: ['2661-8907', '2662-995X']
DOI: https://doi.org/10.1007/s42979-021-00684-8