WITHDRAWN: A New Approach for Service Access Control

Author(s):  
Junzhou Luo ◽  
Xiaopeng Wang ◽  
Aibo Song
2015 ◽  
Vol 25 (09n10) ◽  
pp. 1703-1708 ◽  
Author(s):  
Óscar Mortágua Pereira ◽  
Diogo Domingues Regateiro ◽  
Rui L. Aguiar

In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: (1) if policies are complex, their enforcement can lead to performance decay of database servers; (2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.


2017 ◽  
Vol 6 (2) ◽  
pp. 33
Author(s):  
Yong Wang ◽  
Bharat Rawal

Abstract In this paper, we review security and usability scenarios. We propose security enhancements without losing usability and apply a new approach to popular application systems. Specifically, we analyze database security for access control, auditing, authentication, encryption, integrity control, backups, separation of environment, and secure configuration. Finally, we present our recommendations for system security and usability that work together.


Author(s):  
Liu Hui ◽  
He Xudong ◽  
Gao Fan ◽  
Wang KaiLun ◽  
Yuan Enze

Web services have covered all areas of social life, and various browsers have become necessary software on computers and mobile phones, and they are also the entrances to Web services. All kinds of threats to web data security continue to appear, so web services and browsers have become the focus of security. In response to the requirements of Web service for access entity identification and data access control, this paper proposes a multi-dimensional browser fingerprint detection method based on adversarial learning, and designs a Web service access control framework combined with browser fingerprint detection. Through the joint use of multi-dimensional browser features, adversarial learning is used to improve the accuracy and robustness of browser fingerprint detection; a cross-server and browser-side Web service access control framework is established by creating tags for Web data resources and access entities. Based on the mapping relationship between browser fingerprint detection entities and data resources, fine-grained hierarchical data access control is realized. Through experiments and analysis, the browser fingerprint detection method proposed in this paper is superior to existing machine learning detection methods in terms of accuracy and robustness. Based on the adversarial learning method, good detection results can be obtained in the case of a small number of user samples. At the same time, the open source data set is further used to verify the advantages of the method in this paper. The Web service access control framework can satisfy the requirements of Web data security control, is an effective supplement to user identification technology, and is implementable.


2018 ◽  
Vol 15 (5) ◽  
pp. 853-867 ◽  
Author(s):  
Tao Wang ◽  
Yao Liu ◽  
Tao Hou ◽  
Qingqi Pei ◽  
Song Fang

2004 ◽  
Vol 23 (7) ◽  
pp. 559-570 ◽  
Author(s):  
M. Coetzee ◽  
J.H.P. Eloff

Sign in / Sign up

Export Citation Format

Share Document