CFP last date
20 May 2024
Reseach Article

Design of Algorithm for Environment based Dynamic Access Control Model for Database Systems

by Sajjad Ahmad, Rohiza Ahmad
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 10
Year of Publication: 2011
Authors: Sajjad Ahmad, Rohiza Ahmad
10.5120/2621-3170

Sajjad Ahmad, Rohiza Ahmad . Design of Algorithm for Environment based Dynamic Access Control Model for Database Systems. International Journal of Computer Applications. 21, 10 ( May 2011), 1-8. DOI=10.5120/2621-3170

@article{ 10.5120/2621-3170,
author = { Sajjad Ahmad, Rohiza Ahmad },
title = { Design of Algorithm for Environment based Dynamic Access Control Model for Database Systems },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 10 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number10/2621-3170/ },
doi = { 10.5120/2621-3170 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:08:06.611142+05:30
%A Sajjad Ahmad
%A Rohiza Ahmad
%T Design of Algorithm for Environment based Dynamic Access Control Model for Database Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 10
%P 1-8
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the fast growing nature of enterprise business especially with the emergence of information technology, we are moving towards the era where database systems have become mandatory for the organizations to implement. Because of this, it has become very important to specify such access control model for the database systems in organizations that must ensure the security of information but at the same time dynamic. Conventionally, access control models stress on pre-defined users for which access level is pre-determined by the database administrator. Considering the need of today’s business, that has become borderless, and most of unknown users also attempt to access the information, we present a design algorithm for access control model that can handle for both existing and unknown users of the database. The algorithm deals with three major parts, Environment Check, Roles and Permissions Check and finally the increment and decrement of permissions dynamically.

References
  1. E.Bertino, S.Jajodia, P.Samarati. “Supporting Multiple Access Control Policies in Databases System”. In: IEEE Symposium on Security and Privacy. Oakland, California. 1996.
  2. X. LIU, Z. HAN et al., “The Extended Confidential Level of BLP Model” Proceedings of KES 2005, Knowledge-Based Intelligent Information and Engineering Systems PartIV, Pps257-262
  3. H. Qilong,H. Zhongxiao “Real-time Optimistic Concurrency Control based on Transaction Finish Degree”. Journal of computer science. 2005,1(4):471~476
  4. K. Ramamritham, S.H. Son, L.C. DiPippo, “Real-time databases and data services, Real-Time Systems” Journal 28 (December) (2004) 179–215.
  5. C.A. Ardagna, M. Cremonini, E. Damiani, S.D.C. di Vimercati, P. Samarati, “Supporting location-based conditions in access control policies”. In ASIACCS, Taipei, Taiwan, 2006, pp. 212–222.
  6. http://en.wikipedia.org/wiki/Role-based_access_control
  7. R.S.Sandhu, E.J.Coyne, H.L.Feinstein, C.E.Youman, “Role-Based Access Control Models”, Computer, vol 29, pp. 38-47, 1996.
  8. R. Agarwal, J. Kiernan, R. Seikant, Y. Xu. “Hippocratic databases”. Proceedings of the 28th VLDB Conference, Hong Kong, China, 2002, pages 143-154.
  9. P. Huanchun, G. Jun, Y. Xiaojun. “Dynamic Purpose-based Access Control”. International Symposium on parallel and Distributed Processing with Applications 2008. IEEE Computer Society, Pages 695-700.
  10. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman. “Role-based Access Control Models”. IEEE Computer, volume 29 issue 2, pages 38-47, 1996.
  11. Q. Ni, A. Trombetta, E. Bertino, J. Lobo. “Privacy-aware Role based Access Control”. Symposium on Access Control Model and Technology, ACM, pages 41-50, 2007.
  12. Z. Lingli, L. Shuai, L. Junsheng, X. Haicheng. “A Dynamic Access Control model Based on Trust”. 2nd IEEE Conference on Environmental Science and Information Application Technology, ESIAT 2010, pages 548-551.
  13. J. W. Byun, N. Li. “Purpose based Access Control for Privacy Protection in relational database systems”. The International Journal on Very Large Data Bases, volume 17 issue 4, pages 603-619, 2008.
  14. Z. Hui, f. Zhiyi, S. Lijun, Z. Dan. “Domain-based Access Control for Collaborative E-Commerce System”. 2nd IEEE International Conference on Pervasive Computing and Applications, 2007. ICPCA 2007.
  15. Z. Zhou, X. Renzuo. “A Context-Aware Access Control Model for Pervasive Computing in Enterprise Environments”. 4th IEEE International Conference on Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08.
  16. H. Hua, L. Ande. “Actor and Trust-based dynamic access control model in universal Computing Environment”.IEEE Second International Symposium on Intelligent Information Technology Application, 2008. IITA '08.
  17. C. Pang, G. Dong, and K. Ramamohanarao. Incremental maintenance of shortest distance and transitive closure in ¯rst-order logic and sql. ACM Trans. Database Syst., 30(3):698{721, 2005.
  18. C. Pang, X. Zhang, Y. Zhang, and K. Ramamohanarao. Maintenance of access roles in sql. In Technical Report, 2005.
  19. P. Chaoyi, H. David, M. Anthony. “Managing RBAC States with Transitive Relations” ASIACCS’07, March 20–22, 2007 ACM
  20. R. Indrakshi, K. Mahendra, “Towards a location-based mandatory access control model” compute r s & s e c u r i t y Science Direct 2 5 ( 2 0 0 6 ) 36 – 44
  21. M. J. Moyer and M. Ahamad, "Generalized role based access control," in Proceed-ings of the 2001 International Conference on Distributed Computing Systems, Mesa, AZ, Apr. 2001
  22. S.-H. Park, Y.-J. Han, and T.-M. Chung, "Context-Role Based Access Control for Context-Aware Application," HPCC 2006, LNCS 4208, pp. 572-580, 2006.
  23. X. Huang, H. Wang, Z. Chen, and J. Lin, "A Context, Rule and Role- Based Access Control Model In Enterprise Pervasive Computing Environment," in 1st International Symposium on Pervasive Computing and Applications, Aug. 2006, pp. 497-502.
  24. Ahmad S, Ahmad R, “Environment-based Dynamic Access Control Model for Database Systems” 2011 3rd International Conference on Machine Learning and Computing (ICMLC 2011) ) 978-1-4244-925 3-4 /11
Index Terms

Computer Science
Information Sciences

Keywords

Database Access Control Dynamic Access Control Environment-based RBAC