Fine Grained Access Control in Databases

The goal of this project is to develop a declarative approach to fine-grained access control in databases.

Backgrounds

Starting with Oracle 8i, Oracle introduced the concept of Virtual Private Databases (VPD), which is implemented by server-enforced, fine-grained access control (also known as row-level security) together with secure application context. Fine-grained access control gives one the ability to attach, at run time, a predicate to the where clause of any query issued against a database table (or a view). To do this, one writes a stored procedure that returns a predicate and associates the procedure with a table. When a query is issued against the table, the procedure is executed and the returned predicate is attached to the where clause of the query. The procedure may evaluate who is running the query, when is the query being executed, and query databases, and develop a predicate given those circumstances. The main advantages of VPD are as follows: We see the following research issues with VPD:

Task

Understand existing access control mechanisms in databases and the issues involved in declarative approach to fine-grained access control. Develop a high-level database access control language that supports fine-grained access control.

Potential presentation topics: Fine-grained access control in databases.

References

  1. Fine Grained Access Control (a.k.a. DBMS_RLS). By Thomas Kyte.

  2. The Virtual Private Database in Oracle9iR2 An Oracle technical white paper.

  3. Oracle9i Data Security Internals. Donald K. Burleson.
  4. Implementing Low Level Access Control with DB2 UDB Paul Bird.

  5. A Context-Based Access Control Model for HIPAA Privacy and Security Compliance Smith, Harry. SANS Institute, July 18, 2001.

  6. Access Control in a Relational Data Base Management System by Query Modification. Michael Stonebraker and Eugene Wong. Proceedings of the 1974 annual ACM conference.

  7. An authorization model for a shared data base. E. B. Fernández, R. C. Summers, and C. D. Coleman. SIGMOD'1975.

  8. Specification of Content-Dependent Security Policies. David L. Spooner. Proceedings of the 1983 annual ACM conference on Computers.