Jump to Navigation

Information Control by Policy-Based Relational Weakening Templates

Prof. Joachim Biskup

Joachim Biskup received his Diploma degree in mathematics from Technical University of Hannover in 1972, and his Ph.D. in computer science from RWTH Aachen in 1975. He has been Professor of Computer Science since 1981 at the University of Dortmund, University of Hildesheim, and University of Dortmund again. He has performed research in recursion and complexity theory, information systems with an emphasis on database schema design, query optimization and mediation, and various aspects of security, in particular access control and inference control for enforcing confidentiality. He has joined the program committees of many international conferences, including ICDT, FoIKS, ESORICS and DBSec. Joachim Biskup retired from his chair of Information Systems and Security in 2012, and since then he is affiliated with the Databases and Information Systems Group now headed by Prof Dr. Jens Teubner.

Information Control by Policy-Based Relational Weakening Templates
مسئول برگزاری: محمد حسین منشئی
محل: سالن اجتماعات دانشکده برق و کامپیوتر / تاریخ: 1395-08-17 / زمان: 2:00 بعدازظهر

We present a sophisticated information control mechanism for a relational database instance. The mechanism reacts on access requests for data publishing or query answering with a granularity of either the whole instance or individual tuples. The reaction is based on a general read access permission for the instance combined with user-specific exceptions expressed as prohibitions regarding particular pieces of information declared in a confidentiality policy. These prohibitions are to be enforced in the sense that the user should neither be able to get those pieces directly nor by rational reasoning exploiting the interaction history and background knowledge about both the database and the control mechanism. In an initial off-line phase, the control mechanism basically determines instance-independent weakening templates for individual tuples and generates a policy-compliant weakened view on the stored instance. During the system-user interaction phase, each request to receive data of the database instance is fully accepted but redirected to the weakened view.



Seminars | by Dr. Radut

ارتقاء امنیت وب با وف بومی آسپا-وف