core. The ADQL core can currently be accessed by
REST, SOAP, OSGi, Thrift, string literal IP inter-
face, and a serialized objects IP interface. The net-
work server layer sends all commands received to the
parser. From there, the API layer is called. The API
layer communicateswith the ADQL core layer, where
the logic and internal processes are done. Persistence
is realized by standard relational database compo-
nents. We currently use Hibernate, Hibernate Cache
and Postgresql. Further details about ADQL can be
found at http://iism.kit.edu/em/ref/adql.
Our future work will focus on extensions for
ADQL and its exploitation.
REFERENCES
AG, S. (2008). ADM940 - Berechtigungskonzept AS ABAP
Schulungshandbuch. SAP, Walldorf, Germany.
Ardagna, C. A., Cremonini, M., De Capitani di Vimercati,
S., and Samarati, P. (2008). A privacy-aware access
control system. J. Comput. Secur., 16(4):369–397.
Barker, S. (2009). The next 700 access control models or
a unifying meta-model? In Proceedings of the 14th
ACM symposium on Access control models and tech-
nologies, SACMAT ’09, pages 187–196, New York,
NY, USA. ACM.
Bell, D. E. and LaPadula, L. J. (1975). Secure Com-
puter Systems: Mathematical Foundations and Model.
M74-244. Mitre Corporation, Bedford, MA, USA.
Berners-Lee, T., Fielding, R., Irvine, U., and Masinter, L.
(1998). Uniform resource identifiers (URI): generic
syntax. http://www.ietf.org/rfc/rfc2396.txt. last ac-
cessed: 2011-02-26.
Crampton, J. and Huth, M. (2010). An authorization frame-
work resilient to policy evaluation failures. In Gritza-
lis, D., Preneel, B., and Theoharidou, M., editors,
Computer Security ESORICS 2010, volume 6345 of
Lecture Notes in Computer Science, pages 472–487.
Springer Berlin / Heidelberg. 10.1007/978-3-642-
15497-3
29.
Damiani, E., di Vimercati, S. D. C., Paraboschi, S., and
Samarati, P. (2002). A fine-grained access control sys-
tem for XML documents. ACM Transactions on In-
formation and System Security (TISSEC), 5:169–202.
ACM ID: 505590.
Geysin, S., Petrov, A., Charrue, P., Gajewski, W., Kain, V.,
Kostro, K., Kruk, G., Page, S., and Peryt, M. (2007).
Role-Based access control for the accelerator control
system at CERN. In International Conference on
Accelerator and Large Experimental Physics Control
Systems, pages 90–92, Knoxville, Tennessee, USA.
Gupta, R. and Bhide, M. (2005). A Generic XACML
Based Declarative Authorization Scheme for Java. In
di Vimercati, S. d. C., Syverson, P., and Gollmann, D.,
editors, Computer Security ESORICS 2005, volume
3679 of Lecture Notes in Computer Science, pages
44–63. Springer Berlin / Heidelberg.
Harrison, M. A., Ruzzo, W. L., and Ullman, J. D. (1976).
Protection in operating systems. Communications of
the ACM, 19(8):461–471.
Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo,
J., and Lin, D. (2009). Access control policy combin-
ing: theory meets practice. In Proceedings of the 14th
ACM symposium on Access control models and tech-
nologies, SACMAT ’09, pages 135–144, New York,
NY, USA. ACM.
McLean, J. (1988). The algebra of security. In IEEE Sym-
posium on Security and Privacy, Oakland, CA.
Ni, Q., Bertino, E., and Lobo, J. (2009). D-algebra for com-
posing access control policy decisions. In Proceedings
of the 4th International Symposium on Information,
Computer, and Communications Security, ASIACCS
’09, pages 298–309, New York, NY, USA. ACM.
Notargiacomo, L. (1996). Role-based access control in OR-
ACLE7 and trusted ORACLE7. In Proceedings of
the first ACM Workshop on Role-based access control,
RBAC ’95, New York, NY, USA. ACM.
Rissanen, E. (2010). eXtensible Access Control Markup
Language (XACML) Version 3.0 Committee Draft 03.
OASIS eXtensible Access Control Markup Language
(XACML) TC.
Samarati, P. and Vimercati, S. D. C. d. (2001). Access
control: Policies, models, and mechanisms. In Re-
vised versions of lectures given during the IFIP WG
1.7 International School on Foundations of Security
Analysis and Design on Foundations of Security Anal-
ysis and Design: Tutorial Lectures, pages 137–196.
Springer-Verlag.
Wang, Q., Jin, H., and Li, N. (2009). Usable access
control in collaborative environments: authorization
based on people-tagging. In Proceedings of the 14th
European conference on Research in computer secu-
rity, ESORICS’09, pages 268–284, Berlin, Heidel-
berg. Springer-Verlag.
Yuan, E. and Tong, J. (2005). Attributed based access con-
trol (ABAC) for web services. In Web Services, 2005.
ICWS 2005. Proceedings. 2005 IEEE International
Conference on, pages 569–578.
SECRYPT2012-InternationalConferenceonSecurityandCryptography
386