
tions concerning the differences and use cases of the
two categories for access control approaches. For ex-
ample, the filtered results category is typically used in
retrieving authorized resources based on the defined
policy. The permit-deny access category is less com-
monly used in access control for databases, but still
considered in applications to allow authorized users
to perform specific actions (e.g., edit or delete) on
particular resources and vice versa. A detailed com-
parison of the prototypes (if available) on a common
scenario is considered in the future. Furthermore,
we plan to add more aspects to our comparison and
include other works focusing on protecting property
graph-structured data that have been excluded due to
coarse-grained access control or a lack of application.
ACKNOWLEDGEMENTS
This work has been partly supported by the LIT Se-
cure and Correct Systems Lab funded by the State of
Upper Austria and the Linz Institute of Technology.
This work has also been supported by the COMET-
K2 Center of the Linz Center of Mechatronics (LCM)
funded by the Austrian federal government and the
federal state of Upper Austria.
REFERENCES
Bereksi Reguig, A. A., Mahfoud, H., and Imine, A. (2024).
Towards an effective attribute-based access control
model for neo4j. In Mosbah, M., Kechadi, T., Bella-
treche, L., and Gargouri, F., editors, Model and Data
Engineering, pages 352–366. Springer, Cham.
Bertolissi, C., den Hartog, J., and Zannone, N. (2019). Us-
ing provenance for secure data fusion in cooperative
systems. In Proceedings of the 24th ACM Symposium
on Access Control Models and Technologies, SAC-
MAT ’19, page 185–194. ACM.
Bruns, G., Fong, P. W. L., Siahaan, I., and Huth, M. (2012).
Relationship-based access control. In Bertino, E. and
Sandhu, R. S., editors, Proceedings of the 2nd ACM
conference on Data and Application Security and Pri-
vacy, pages 117–124. ACM.
Chabin, J., Ciferri, C. D. A., Halfeld-Ferrari, M., Hara,
C. S., and Penteado, R. R. M. (2021). Role-based ac-
cess control on graph databases. In Bure
ˇ
s, T., Dondi,
R., Gamper, J., Guerrini, G., Jurdzi
´
nski, T., Pahl, C.,
Sikora, F., and Wong, P. W., editors, SOFSEM 2021:
Theory and Practice of Computer Science, pages 519–
534. Springer, Cham.
Clark, S., Yakovets, N., Fletcher, G., and Zannone, N.
(2022). Relog: A unified framework for relationship-
based access control over graph databases. In Data
and Applications Security and Privacy XXXVI, page
303–315. Springer, Cham.
Hofer, D., Mohamed, A., Auer, D., Nadschl
¨
ager, S., and
K
¨
ung, J. (2023a). Rewriting graph-db queries to en-
force attribute-based access control. In Strauss, C.,
Amagasa, T., Kotsis, G., Tjoa, A. M., and Khalil, I.,
editors, Database and Expert Systems Applications,
pages 431–436. Springer, Cham.
Hofer, D., Mohamed, A., Nadschl
¨
ager, S., and Auer, D.
(2023b). An intermediate representation for rewriting
cypher queries. In Kotsis, G., Tjoa, A. M., Khalil, I.,
Moser, B., Mashkoor, A., Sametinger, J., and Khan,
M., editors, Database and Expert Systems Applica-
tions - DEXA 2023 Workshops, pages 86–90. Springer.
Jin, Y. and Kaja, K. (2019). Xacml implementation based
on graph databases. In Proceedings of the 34th Inter-
national Conference on Computers and Their Appli-
cations, pages 65–74.
Mohamed, A., Auer, D., Hofer, D., and K
¨
ung, J. (2020).
Authorization policy extension for graph databases.
In Dang, T. K., K
¨
ung, J., Takizawa, M., and Chung,
T. M., editors, Future Data and Security Engineering,
pages 47–66. Springer, Cham.
Mohamed, A., Auer, D., Hofer, D., and K
¨
ung, J. (2023a).
Xacml extension for graphs: Flexible authorization
policy specification and datastore-independent en-
forcement. In Proceedings of the 20th Interna-
tional Conference on Security and Cryptography - SE-
CRYPT, pages 442–449. INSTICC, SciTePress.
Mohamed, A., Auer, D., Hofer, D., and K
¨
ung, J. (2023b).
A systematic literature review of authorization and ac-
cess control requirements and current state of the art
for different database models. International Journal
of Web Information Systems.
Morgado, C., Busichia Baioco, G., Basso, T., and Moraes,
R. (2018). A security model for access control in
graph-oriented databases. In 2018 IEEE International
Conference on Software Quality, Reliability and Secu-
rity (QRS), pages 135–142.
Rizvi, S. Z. R. and Fong, P. W. L. (2018). Efficient au-
thorization of graph database queries in an attribute-
supporting rebac model. In Zhao, Z., Ahn, G.-J., Kr-
ishnan, R., and Ghinita, G., editors, CODASPY’18,
pages 204–211. ACM.
Rizvi, S. Z. R., Fong, P. W. L., Crampton, J., and Sellwood,
J. (2015). Relationship-based access control for an
open-source medical records system. In Weippl, E.,
Kerschbaum, F., and Lee, A. J., editors, Proceedings
of the 20th ACM Symposium on Access Control Mod-
els and Technologies, pages 113–124. ACM.
Samarati, P. and de Vimercati, S. C. (2001). Access control:
Policies, models, and mechanisms. In Focardi, R. and
Gorrieri, R., editors, Foundations of Security Analysis
and Design, pages 137–196. Springer Berlin.
Valzelli., M., Maurino., A., and Palmonari., M. (2020).
A fine-grained access control model for knowledge
graphs. In Proceedings of the 17th International Joint
Conference on e-Business and Telecommunications -
SECRYPT, pages 595–601. INSTICC, SciTePress.
Comparison of Access Control Approaches for Graph-Structured Data
583