developed on top of the DDS and integrated into the
marketplace, too. Of particular interest is the
combination of data access with making data
anonymous.
Our future work will consider commonly
used database interfaces such as OData
(http://www.odata.org) and other high-level REST
APIs as data providers. We also plan to evaluate in
depth whether the approach is appropriate for
advanced restrictions such as satisfying regulatory
compliance, governmental or dictated by another
body. Moreover, the performance impact of filtering
will be investigated in detail.
REFERENCES
Abramov, J., Anson, O., Dahan, M. et al., 2012. A
methodology for integrating access control policies
within database development. Computers & Security,
2012, Vol. 31, No 3, pp. 299-314.
Balazinska, M., Howe, B., and Suciu, D., 2017. Data
markets in the cloud: An opportunity for the fatabase
community. Proc. of VLDB Endowment 2011, Vol. 4,
No 12, pp. 1482-1485.
Barker, S., 2008. Dynamic meta-level access control in
SQL. In: Data and Applications Security XXII.
Springer Berlin Heidelberg, 2008, pp. 1-16.
Bertino, E., Jajodia, S., and Samarati, P., 1999. A flexible
authorization mechanism for relational data manage-
ment systems. In ACM Transactions on Information
Systems, Vol. 17, No. 2, April 1999, pp. 101-140.
Caires, L., Pérez, J., Seco, J. et al., 2011. Type-based
access control in data-centric systems. In: 20th
European Conference on Programming Languages and
Systems: Part of the joint European conferences on
theory and practice of software. Springer Berlin
Heidelberg, 2011. pp. 136-155.
Chaudhuri, S., Dutta, T. and Sudarshan, S., 2007. Fine
grained authorization through predicated grants. In:
23rd Int. Conference on Data Engineering (ICDE),
IEEE 2007, pp. 1174-1183.
Chlipala, A. and Impredicative, L., 2010. Static checking
of dynamically-varying security policies in database-
backed applications. In: The USENIX Conference on
Operating Systems Design and Implementation, 2010,
pp. 105-118.
Corcoran, B., Swamy, N., and Hicks, M., 2009. Cross-tier,
label-based security enforcement for web applications.
In: Proc. of the 2009 ACM SIGMOD Int. Conference
on Management of Data. ACM, 2009, pp. 269-282.
Fischer, J., Mario, D., Majumdar, R. et al., 2009. Fine-
grained access control with object-sensitive roles. In:
European Conf. on Object-Oriented Programming
(ECOOP 2009). Springer Berlin Heidelberg, 2009, pp.
173-194.
Fuchs, L., Pernul, G., and Sandhu, R., 2011. Roles in
information security – a survey and classification of
the research area. Computers & Security, 2011, Vol.
30, No 8, pp. 748-769.
Jayaraman, K., Tripunitara, M., Ganesh, V. et al., 2013.
Mohawk: abstraction-refinement and bound-
estimation for verifying access control policies. ACM
Transactions on Information and System Security
(TISSEC), 2013, Vol. 15, No 4, Article No 18.
Komlenovic, M., Tripunitara, M., and Zitouni, T., 2011.
An empirical assessment of approaches to distributed
enforcement in role-based access control (RBAC).
CODASPY 2011, pp. 121-132.
LeFevre, K., Agrawal, R., Ercegovac, V. et al., 2004.
Limiting disclosure in hippocratic databases. In: Proc.
13th VLDB, pp. 108-119.
Oracle, 2017. Using Oracle Virtual Private Database to
Control Data Access. [Online]. Available: https://
docs.oracle.com/cd /B28359_01/network.111/b28531/
vpd.htm#DBSEG007.
Pereira, O., Regateiro, D., and Aguiar, R., 2014.
Distributed and Typed Role-based Access Control
Mechanisms Driven by CRUD Expressions. Int.
Journal of Computer Science: Theory and Application,
Vol. 2, No 1, October 2014, pp 1-11.
Rizvi, S., Mendelzon, A., Sudarshan, S., and Roy, P.,
2004. Extending query rewriting techniques for fine-
grained access control. In: ACM SIGMOD Conference
2004, pp. 551–562
Rjaibi, W., 2012. Data security best practices: a practical
guide to implementing row and column access control.
[Online]. Available: https://www.ibm.com/developer
works/community/wikis/home?lang=en#!/wiki/Wc9a0
68d7f6a6_4434_aece_0d297ea80ab1/page/A%20pract
ical%20guide%20to%20implementing%20row%20an
d%20column%20access%20control.
Roichman, A. and Gudes, E., 2007. Fine-grained access
control to web databases. In: Proceedings of the 12th
ACM symposium on access control models and
technologies. ACM, 2007. pp. 31-40.
Roman, D., Paniagua, J., Tarasova T. et al., 2017.
proDataMarket: a data marketplace for monetizing
linked data. Demo paper at 16
th
Int. Semantic Web
Conference (ISWC’17), Vienna 2017.
Sonntag, D., Tresp, V., Zillner, S., Cavallaro, A. et al.,
2015. The clinical data intelligence project.
Informatik-Spektrum Journal 2015, pp. 1–11.
Wang, Q, Yu, T., Li, N. et al., 2007. On the correctness
criteria of fine-grained access control in relational
databases. In: Proc. of the 33rd Int. conference on
Very Large Data Bases, 2007, pp. 555-566.
Zarnett, J., Tripunitara, M., and Lam, P., 2010. Role-based
access control (RBAC) in Java via proxy objects using
annotations. In: Proc. of the 15th ACM symposium on
access control models and technologies. ACM, 2010,
pp. 79-88.
XACML, 2012. XACML – eXtensible Access Control
Markup Language. [Online]. Available: http://www.
oasisopen.org/committees/tchome.php?wgabbrev=xac
ml.