Utilize este identificador para referenciar este registo: https://hdl.handle.net/1822/25069

Registo completo
Campo DCValorIdioma
dc.contributor.authorPereira, Óscar M.-
dc.contributor.authorAguiar, Rui L.-
dc.contributor.authorSantos, Maribel Yasmina-
dc.date.accessioned2013-09-09T14:21:28Z-
dc.date.available2013-09-09T14:21:28Z-
dc.date.issued2013-06-
dc.identifier.isbn978-1-891706-33-2-
dc.identifier.issn2325-9000por
dc.identifier.urihttps://hdl.handle.net/1822/25069-
dc.description.abstractAccess control is a key challenge in software engineering, especially in relational database applications. Current access control techniques are based on additional security layers designed by security experts. These additional security layers do not take into account the necessary business logic leading to a separation between business tiers and access control mechanisms. Moreover, business tiers are built from commercial tools (ex: Hibernate, JDBC, ODBC, LINQ), which are not tailored to deal with security aspects. To overcome this situation several proposals have been presented. In spite of their relevance, they do not support the enforcement of access control policies at the level of the runtime values that are used to interact with protected data. Runtime values are critical entities because they play a key role in the process of defining which data is accessed. In this paper, we present a general technique for static checking, at the business tier level, the runtime values that are used to interact with databases and in accordance with the established access control policies. The technique is applicable to CRUD (create, read, update and delete) expressions and also to actions (update and insert) that are executed on data retrieved by Select expressions. A proof of concept is also presented. It uses an access control platform previously developed, which lacks the key issue of this paper. The collected results show that the presented approach is an effective solution to enforce access control policies at the level of runtime values that are used to interact with data residing in relational databases.por
dc.description.sponsorship(undefined)por
dc.language.isoengpor
dc.publisherKnowledge Systems Institutepor
dc.rightsopenAccesspor
dc.subjectSecuritypor
dc.subjectAccess controlpor
dc.subjectDatabasespor
dc.subjectBusiness tierspor
dc.subjectSoftware architecturepor
dc.subjectDatabasepor
dc.titleRuntime values driven by access control policies: statically enforced at the level of relational business tierspor
dc.typeconferencePaperpor
dc.peerreviewedyespor
sdum.publicationstatuspublishedpor
oaire.citationStartPage1por
oaire.citationEndPage7por
oaire.citationIssueJanuarypor
oaire.citationConferencePlaceBoston, USApor
oaire.citationTitleThe 25th International Conference on Software Engineering and Knowledge Engineering (SEKE’2013)por
oaire.citationVolume2013-Januarypor
sdum.journalProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKEpor
sdum.conferencePublicationProceedings of the International Conference on Software Engineering and Knowledge Engineering, SEKEpor
Aparece nas coleções:CAlg - Artigos em livros de atas/Papers in proceedings

Ficheiros deste registo:
Ficheiro Descrição TamanhoFormato 
SEKE2013_OMP_RLA_MYS.pdfDocumento Principal327,68 kBAdobe PDFVer/Abrir

Partilhe no FacebookPartilhe no TwitterPartilhe no DeliciousPartilhe no LinkedInPartilhe no DiggAdicionar ao Google BookmarksPartilhe no MySpacePartilhe no Orkut
Exporte no formato BibTex mendeley Exporte no formato Endnote Adicione ao seu ORCID