A formal study of collaborative access ...
Document type :
Communication dans un congrès avec actes
Title :
A formal study of collaborative access control in distributed datalog
Author(s) :
Abiteboul, Serge [Auteur]
Verification in databases [DAHU]
Laboratoire Spécification et Vérification [Cachan] [LSV]
Bourhis, Pierre [Auteur]
Linking Dynamic Data [LINKS]
Vianu, Victor [Auteur]
Verification in databases [DAHU]
Department of Computer Science and Engineering [Univ California San Diego] [CSE - UC San Diego]
Verification in databases [DAHU]
Laboratoire Spécification et Vérification [Cachan] [LSV]
Bourhis, Pierre [Auteur]

Linking Dynamic Data [LINKS]
Vianu, Victor [Auteur]
Verification in databases [DAHU]
Department of Computer Science and Engineering [Univ California San Diego] [CSE - UC San Diego]
Scientific editor(s) :
Wim Martens
Thomas Zeume
Thomas Zeume
Conference title :
ICDT 2016 - 19th International Conference on Database Theory
City :
Bordeaux
Country :
France
Start date of the conference :
2016-03-15
HAL domain(s) :
Informatique [cs]/Base de données [cs.DB]
English abstract : [en]
We formalize and study a declaratively specified collaborative access control mechanism for data dissemination in a distributed environment. Data dissemination is specified using distributed datalog. Access control is also ...
Show more >We formalize and study a declaratively specified collaborative access control mechanism for data dissemination in a distributed environment. Data dissemination is specified using distributed datalog. Access control is also defined by datalog-style rules, at the relation level for extensional relations, and at the tuple level for intensional ones, based on the derivation of tuples. The model also includes a mechanism for " declassifying " data, that allows circumventing overly restrictive access control. We consider the complexity of determining whether a peer is allowed to access a given fact, and address the problem of achieving the goal of disseminating certain information under some access control policy. We also investigate the problem of information leakage, which occurs when a peer is able to infer facts to which the peer is not allowed access by the policy. Finally, we consider access control extended to facts equipped with provenance information, motivated by the many applications where such information is required. We provide semantics for access control with provenance, and establish the complexity of determining whether a peer may access a given fact together with its provenance. This work is motivated by the access control of the Webdamlog system, whose core features it formalizes.Show less >
Show more >We formalize and study a declaratively specified collaborative access control mechanism for data dissemination in a distributed environment. Data dissemination is specified using distributed datalog. Access control is also defined by datalog-style rules, at the relation level for extensional relations, and at the tuple level for intensional ones, based on the derivation of tuples. The model also includes a mechanism for " declassifying " data, that allows circumventing overly restrictive access control. We consider the complexity of determining whether a peer is allowed to access a given fact, and address the problem of achieving the goal of disseminating certain information under some access control policy. We also investigate the problem of information leakage, which occurs when a peer is able to infer facts to which the peer is not allowed access by the policy. Finally, we consider access control extended to facts equipped with provenance information, motivated by the many applications where such information is required. We provide semantics for access control with provenance, and establish the complexity of determining whether a peer may access a given fact together with its provenance. This work is motivated by the access control of the Webdamlog system, whose core features it formalizes.Show less >
Language :
Anglais
Peer reviewed article :
Oui
Audience :
Internationale
Popular science :
Non
Collections :
Source :
Files
- https://hal.inria.fr/hal-01290497/document
- Open access
- Access the document
- https://hal.inria.fr/hal-01290497/document
- Open access
- Access the document
- https://hal.inria.fr/hal-01290497/document
- Open access
- Access the document
- document
- Open access
- Access the document
- icdt16.pdf
- Open access
- Access the document
- document
- Open access
- Access the document
- icdt16.pdf
- Open access
- Access the document