Back to Search Start Over

Collaborative Access Control in WebdamLog

Authors :
Serge Abiteboul
Gerome Miklau
Julia Stoyanovich
Vera Zaychik Moffitt
Drexel University
Laboratoire Spécification et Vérification [Cachan] (LSV)
École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)
Verification in databases (DAHU)
École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Cachan (ENS Cachan)-Centre National de la Recherche Scientifique (CNRS)-Inria Saclay - Ile de France
Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)
Department of Computer Science [Amherst]
University of Massachusetts [Amherst] (UMass Amherst)
University of Massachusetts System (UMASS)-University of Massachusetts System (UMASS)
Source :
SIGMOD Conference, Proceeding of the ACM Sigmod Conference on Data Management, Proceeding of the ACM Sigmod Conference on Data Management, 2015, Melbourne, Australia
Publication Year :
2015
Publisher :
ACM, 2015.

Abstract

International audience; The management of Web users' personal information is increasingly distributed across a broad array of applications and systems, including online social networks and cloud-based services. Users wish to share data using these systems, but avoiding the risks of unintended disclosures or unauthorized access by applications has become a major challenge. We propose a novel access control model that operates within a distributed data management framework based on datalog. Using this model, users can control access to data they own and control applications they run. They can conveniently specify access control policies providing flexible tuple-level control derived using provenance information. We present a formal specification of the model, an implementation built using an open-source distributed datalog engine, and an extensive experimental evaluation showing that the computational cost of access control is modest.

Details

Database :
OpenAIRE
Journal :
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data
Accession number :
edsair.doi.dedup.....f0d1d0d98d0d397beaf12ff29dcc6ae7
Full Text :
https://doi.org/10.1145/2723372.2749433