loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Aya Mohamed 1 ; 2 ; Dagmar Auer 1 ; 2 ; Daniel Hofer 1 ; 2 and Josef Küng 1 ; 2

Affiliations: 1 Institute of Application-oriented Knowledge Processing, Johannes Kepler University Linz, Linz, Austria ; 2 LIT Secure and Correct Systems Lab, Johannes Kepler University Linz, Linz, Austria

Keyword(s): Access Control, Authorization Policy, ABAC, ReBAC, Graph-Structured Data, Property Graph.

Abstract: Access control is the enforcement of the authorization policy, which defines subjects, resources, and access rights. Graph-structured data requires advanced, flexible, and fine-grained access control due to its complex structure as sequences of alternating vertices and edges. Several research works focus on protecting property graph-structured data, enforcing fine-grained access control, and proving the feasibility and applicability of their concept. However, they differ conceptually and technically. To gain a profound overview of the current state of research, we study works from our systematic literature review on authorization and access control for different database models in addition to recent ones. Based on defined criteria, we exclude research works which do not protect graph-structured data, have coarse-grained approaches, consider models other than the property graph model, or have no proof-of-concept implementation. The latest version of the remaining works are discussed i n detail in terms of their access control approach as well as authorization policy definition and enforcement. Finally, we analyze the strengths and limitations of the selected works and provide a comparison with respect to different aspects, including the base access control model, open/closed policy, negative permission support, and datastore-independent enforcement. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.188.216.107

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mohamed, A., Auer, D., Hofer, D. and Küng, J. (2024). Comparison of Access Control Approaches for Graph-Structured Data. In Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-709-2; ISSN 2184-7711, SciTePress, pages 576-583. DOI: 10.5220/0012861500003767

@conference{secrypt24,
author={Aya Mohamed and Dagmar Auer and Daniel Hofer and Josef Küng},
title={Comparison of Access Control Approaches for Graph-Structured Data},
booktitle={Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT},
year={2024},
pages={576-583},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012861500003767},
isbn={978-989-758-709-2},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
TI - Comparison of Access Control Approaches for Graph-Structured Data
SN - 978-989-758-709-2
IS - 2184-7711
AU - Mohamed, A.
AU - Auer, D.
AU - Hofer, D.
AU - Küng, J.
PY - 2024
SP - 576
EP - 583
DO - 10.5220/0012861500003767
PB - SciTePress