{"title":"JTAM - A Joint Threshold Administration Model","authors":"Ashish Kamra, E. Bertino","doi":"10.1109/POLICY.2010.34","DOIUrl":null,"url":null,"abstract":"We propose a Joint Threshold Administration Model (JTAM) for performing certain critical and sensitive database operations such as user/role permission assignment, user/role creation, and so forth. The key idea is that a JTAM enabled operation is incomplete unless it is authorized by at least k - 1 additional DBAs. We present the design details of JTAM based on a cryptographic threshold signature scheme. We implement JTAM in the PostgreSQL DBMS, and demonstrate the execution of the JTAM enabled SQL GRANT command. We also show how to prevent malicious modifications to the JTAM enabled operations.","PeriodicalId":143330,"journal":{"name":"2010 IEEE International Symposium on Policies for Distributed Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on Policies for Distributed Systems and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2010.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We propose a Joint Threshold Administration Model (JTAM) for performing certain critical and sensitive database operations such as user/role permission assignment, user/role creation, and so forth. The key idea is that a JTAM enabled operation is incomplete unless it is authorized by at least k - 1 additional DBAs. We present the design details of JTAM based on a cryptographic threshold signature scheme. We implement JTAM in the PostgreSQL DBMS, and demonstrate the execution of the JTAM enabled SQL GRANT command. We also show how to prevent malicious modifications to the JTAM enabled operations.