{"title":"联合阈值管理模型","authors":"Ashish Kamra, E. Bertino","doi":"10.1109/POLICY.2010.34","DOIUrl":null,"url":null,"abstract":"We propose a Joint Threshold Administration Model (JTAM) for performing certain critical and sensitive database operations such as user/role permission assignment, user/role creation, and so forth. The key idea is that a JTAM enabled operation is incomplete unless it is authorized by at least k - 1 additional DBAs. We present the design details of JTAM based on a cryptographic threshold signature scheme. We implement JTAM in the PostgreSQL DBMS, and demonstrate the execution of the JTAM enabled SQL GRANT command. We also show how to prevent malicious modifications to the JTAM enabled operations.","PeriodicalId":143330,"journal":{"name":"2010 IEEE International Symposium on Policies for Distributed Systems and Networks","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"JTAM - A Joint Threshold Administration Model\",\"authors\":\"Ashish Kamra, E. Bertino\",\"doi\":\"10.1109/POLICY.2010.34\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a Joint Threshold Administration Model (JTAM) for performing certain critical and sensitive database operations such as user/role permission assignment, user/role creation, and so forth. The key idea is that a JTAM enabled operation is incomplete unless it is authorized by at least k - 1 additional DBAs. We present the design details of JTAM based on a cryptographic threshold signature scheme. We implement JTAM in the PostgreSQL DBMS, and demonstrate the execution of the JTAM enabled SQL GRANT command. We also show how to prevent malicious modifications to the JTAM enabled operations.\",\"PeriodicalId\":143330,\"journal\":{\"name\":\"2010 IEEE International Symposium on Policies for Distributed Systems and Networks\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE International Symposium on Policies for Distributed Systems and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/POLICY.2010.34\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Symposium on Policies for Distributed Systems and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/POLICY.2010.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We propose a Joint Threshold Administration Model (JTAM) for performing certain critical and sensitive database operations such as user/role permission assignment, user/role creation, and so forth. The key idea is that a JTAM enabled operation is incomplete unless it is authorized by at least k - 1 additional DBAs. We present the design details of JTAM based on a cryptographic threshold signature scheme. We implement JTAM in the PostgreSQL DBMS, and demonstrate the execution of the JTAM enabled SQL GRANT command. We also show how to prevent malicious modifications to the JTAM enabled operations.