DOI QR코드

DOI QR Code

A Method for Semantic Access Control using Hierarchy Tree

계층트리를 이용하는 의미적 접근제어 방식

  • 강우준 (그리스도대학교 경영학부)
  • Received : 2011.10.11
  • Accepted : 2011.12.16
  • Published : 2011.12.31

Abstract

For advanced database security, various researches and challenges are being done to keep pace with new information technologies. We suggests new extended access control that make it possible to conform security policies even with uncertain context and purpose. There may be a discrepancy between the syntactic phrase in security policies and that in queries, called semantic gap problem. New access control derive semantic implications from context and purpose hierarchy tree and control the exceed privileges using semantic gap factor calculating the degree of the discrepancy. And then, We illustrate prototype system architecture and show performance comparison with existing access control methods.

데이터베이스 보안 기술은 새로운 컴퓨팅 환경에 대응하기 위해 전통적인 접근제어방식을 확장하여 다양한 연구들이 수행되고 있다. 본 연구에서는 보안요소의 의미적 정보를 기반으로 정책 제약조건과 질의 제약조건이 구문적으로 일치하지 않는 경우에도 보안요소의 의미를 파악하여 적절한 보안정책 집행이 가능하도록 하는 접근제어 방식을 제안한다. 의미적 보안정책 집행을 위해 시멘틱 트리계층 구조 상에서 이들 간의 의미적 함의관계를 이용하고 또한 함의에 의해 초래될 수 있는 과도한 권한부여를 방지할 수 있도록 한다. 그리고 제안방식을 구현하는 프로토타입 시스템의 구조와 성능평가를 통해 다른 접근제어 방식들과 비교한다.

Keywords

References

  1. Weiser, M., "Hot Topics: Ubiquitous Computing", IEEE Computer, 1993.
  2. Kumar, N., Chafle, G., "Context Sensitivity in Role-based Access Control", Operating Systems Review, Vol. 36, No. 3, IBM Journal, 2002
  3. Wang, X.H., Xhang, D.Q., Gu, T., and Pung, H.K., "Ontology Based Context Modeling and Reasoning using OWL", in PerCom2004 Annual Conference on Pervasive computing and Communications Workshop, 2004
  4. Powers, C.S., Ashley, P., Schunter, M., "Privacy Promises, Access Control and Privacy Management," Proc. of the 3rd International Symposium on Electronic Commerce, pp. 13-21, IEEE, 2002.
  5. Bertino., E., Castano, S., Ferrari, E. and Mesiti, M., "Specifying and Enforcing Access Control Policies for XML Document Sources", WWW Journal, Baltzer Science Publishers, Vol. 3, No. 3, pp. 139-151, 2000.
  6. Rastogi et al, "Access Control over Uncertain Data", PVLDB '08, 2008.
  7. P. Balbiani, "Access control with uncertain surveillance", International Conference on Web Intelligence, 2005.
  8. Dalvi et al, "Efficient query evaluation on probabilistic databases", VLDB J, 2007.
  9. Sandhu, R., Ferraiolo, D., and Kuhm, R., "The NIST Model for Role-Based Access Control: Towards A Unified Standard", in Proceedings of the fifth ACM workshop on Role-based access control, 2000
  10. 강우준, "불확정 상황정보 상에서의 접근제어 방식", (사)인터넷방송통신학회 논문지 제10권 제6호, pp. 215-223, 2010.
  11. Byun, J., Bertino, E., Li, N., "Purpose-based Access Control of Complex Data for Privacy Protection", SACMAT, pp102-110, 2005
  12. Adam, N.R., Atluri, V., "A Content-based Authorization Model for Digital Libraries", IEEE Transactions on knowledge and data engineering, Vol. 14, No. 2, 2002.
  13. Chandramouli, R., "A Framework for Multiple Authorization Types in a Healthcare Application System", Proc. of the 17th Annual Computer Security applications Conference (ACSAC 2001), pp. 137-148, IEEE, 2001.
  14. Covington, M.J., Srinivasan, S., Abowd, G., "Securing context-aware applications using environment roles", in SACMAT 2001.
  15. Bertino, E., Castano, S., and Ferrai, E., "Securing XML documents with Author-x", IEEE InternetComputing, May.June, pp. 21-31, 2001.
  16. Qin, L., Atluri, V., "Concept-level Access Control for the Semantic Web", in ACM Workshop on XML Security, 2003.
  17. Bitton, D., Dewitt, D.J., Turbyfill, C., "Benchmarking database systems: a system approach", In: 9th International Conference on Very Large Data Base, VLDB, 1983.