An active rule based approach to database security in e-commerce systems using temporal constraints

P. Ramasubramanian, A. Kannan
{"title":"An active rule based approach to database security in e-commerce systems using temporal constraints","authors":"P. Ramasubramanian, A. Kannan","doi":"10.1109/TENCON.2003.1273427","DOIUrl":null,"url":null,"abstract":"In this paper, we present a technique that can efficiently identify anomalous accesses to the database by using an authorization rule system which has been designed for implementing a user dynamic access control system which will secure inter-operation of independently managed database services in an open, distributed environment. Traditional authorization models do not adequately meet access control requirements typical to databases, a separate authorization rule subsystem has been designed which is based on temporal event matching language (TEML). The rule specified in this security system is in event-time-condition-action (ETCA) format. XML is used for defining the authorization rules and the security rules. We could extract XML access control data from several platforms and represent the access control data for the entire enterprise through a common model. Similarly, access control data under an enterprise model can be translated to ones that are native to the platforms.","PeriodicalId":405847,"journal":{"name":"TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2003-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TENCON.2003.1273427","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

In this paper, we present a technique that can efficiently identify anomalous accesses to the database by using an authorization rule system which has been designed for implementing a user dynamic access control system which will secure inter-operation of independently managed database services in an open, distributed environment. Traditional authorization models do not adequately meet access control requirements typical to databases, a separate authorization rule subsystem has been designed which is based on temporal event matching language (TEML). The rule specified in this security system is in event-time-condition-action (ETCA) format. XML is used for defining the authorization rules and the security rules. We could extract XML access control data from several platforms and represent the access control data for the entire enterprise through a common model. Similarly, access control data under an enterprise model can be translated to ones that are native to the platforms.
电子商务系统中使用时间约束的基于主动规则的数据库安全方法
在本文中,我们提出了一种技术,可以有效地识别异常访问数据库,通过使用授权规则系统,该系统是为实现用户动态访问控制系统而设计的,该系统将确保在开放,分布式环境中独立管理的数据库服务的互操作。传统的授权模型不能很好地满足数据库的访问控制需求,因此设计了一个基于时态事件匹配语言(TEML)的独立授权规则子系统。该安全系统中指定的规则采用事件-时间-条件-动作(ETCA)格式。XML用于定义授权规则和安全规则。我们可以从多个平台提取XML访问控制数据,并通过一个公共模型表示整个企业的访问控制数据。类似地,企业模型下的访问控制数据可以转换为平台的本地数据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信