feasible because of the many ways data can be
accessed, and different operations executed.
Vimercati et al. (2008) present that the chase
process exploits a specific data structure, called
tableau, to represent a query or a relation. It is
usually adopted to study and identify functional
dependencies within a relation schema, to check if a
decomposition is lossy or lossless, to evaluate if the
result of a query q
i
is contained in the result of
another query q
j
(or vice versa) without explicitly
computing the queries. When the verification returns
false, the user receive no data, and the application
must be change to comply with the rule. In RBAC
approach, query is rewritten in order to return only
data user has access. No error is returned, and the
user receives only data he has access to. They
propose a graph model approach to model
authorization rule, database schema and queries,
using authorization compositions and coloring the
graph. This approach has the following drawbacks:
it handles authorization for read operations (queries)
and not write operations; it does not handle
authorization on specific tuples of tables; it does not
handle cyclic schemas, so it requires to remove all
cycle from existing schemas which can be very
expensive, and not feasible in practice. Medium and
large companies usually cannot change their
database to comply with this requirement.
7 CONCLUSIONS
Data access security is an important issue for
enterprises. Authorization rules are traditionally
implemented into IT applications, which define their
own security policies and enforce them at the client
layer. However, if a rule change, all applications that
implemented the rule must be updated. So, it is a
very complex problem in a scenario with lot o
legacy systems.
In order to improve this environment, there are
solutions for authorization control on top of
databases, such as Discretionary access control
(DAC), Mandatory access control (MAC), and Role-
based access control (RBAC). However, such
implementations are difficult to manage, thus
requiring skilled professionals.
In this work, we presented a flexible and easy to
use framework for managing and controlling
authorization rules of applications on top of
corporative databases. The framework has two
components (i) Authorization rule management
(ARM) and (ii) Authorization rule execution (ARE).
ARE component was implemented using Virtual
Private Database (VPD) in Oracle, and evaluated
using TPC-H Benchmark queries and data. The
results showed the effectiveness of the proposal.
Further experiments are being conducted, beyond
the scope of this work, addressing the performance
impact of our proposal.
As future work, we point the implementation of
ARM and the evaluation of the ARE in a real
scenario. For the first, we are evaluating if existing
Business Rule Management System comply with
ARM requirements. For the second, we are
executing experimental tests in real scenarios.
REFERENCES
BRG, 2009. The Business Rules Group. http://www.
businessrulesgroup.org/home-brg.shtml.
Calì, A., Martinenghi, D. 2008. Querying data under
access limitations. In ICDE 2008, Cancun.
DoD, 1983, Trusted Computer Security Evaluation
Criteria. Department of Defense, DoD 5200.28-STD.
Ferraiolo, D., Khun, D. 1992, Role-Based Access Control.
In: 15th Nat´l Computer Security Conf, pp. 554-563.
Ferraiolo, D.F., Sandhu, R., et al., 2001, Proposed NIST
standard for role-based access control. ACM
Transactions on Information and System Security 4
(3), pp. 224-274.
Fischer et al., 2009, Fine-Grained Access Control with
Object-Sensitive Roles, In: Drossopoulou (Ed.):
ECOOP 2009, LNCS 5653, pp. 173–194
Murthy, R., Sedlar, E., 2007. Flexible and efficient access
control in oracle. In ACM SIGMOD 2007, pp. 973-
980, Beijing.
ORACLE. 2003. Oracle Label Security Administrator's
Guide. Oracle Corporation.
http://download.oracle.com/docs/cd/B14117_01/netwo
rk.101/b10774.pdf.
ORACLE, 2008. Oracle Database Security Guide, Oracle
RDBMS 10gR2. Oracle Corporation. http://download.
oracle.com/docs/cd/B19306_01/network.102/b14266.p
df.
SOX, 2009. Sarbanes-Oxley: Financial and Accounting
Disclosure Information. http://www.sarbanes-
oxley.com/section.php?level=1&pub_id=SOA-Manual
TPCH, 2008. TPC Benchmark H Standard Specification
Revision 2.8.0. Transaction Processing Perfermance
Council. http://www.tpc.org/tpch/spec/tpch2.8.0.pdf.
Vimercati, S., Foresti, S. et al., P. 2008. Controlled
information sharing in collaborative distributed query
processing. In Proc. of ICDCS 2008, Beijing.
Yang, L. 2009. Teaching database security and auditing.
ACM SIGCSE 1(1), pp. 241—245.
ICEIS 2010 - 12th International Conference on Enterprise Information Systems
280