Collaborative access control in WebdamLog

Vera Zaychik Moffitt, Julia Stoyanovich, Serge Abiteboul, Gerome Miklau

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    The management of Web users' personal information is increasingly distributed across a broad array of applications and systems, including online social networks and cloudbased services. Users wish to share data using these systems, but avoiding the risks of unintended disclosures or unauthorized access by applications has become a major challenge. We propose a novel access control model that operates within a distributed data management framework based on datalog. Using this model, users can control access to data they own and control applications they run. They can conveniently specify access control policies providing flexible tuple-level control derived using provenance information. We present a formal specification of the model, an implementation built using an open-source distributed datalog engine, and an extensive experimental evaluation showing that the computational cost of access control is modest.

    Original languageEnglish (US)
    Title of host publicationSIGMOD 2015 - Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data
    PublisherAssociation for Computing Machinery
    Pages197-211
    Number of pages15
    ISBN (Electronic)9781450327589
    DOIs
    StatePublished - May 27 2015
    EventACM SIGMOD International Conference on Management of Data, SIGMOD 2015 - Melbourne, Australia
    Duration: May 31 2015Jun 4 2015

    Publication series

    NameProceedings of the ACM SIGMOD International Conference on Management of Data
    Volume2015-May
    ISSN (Print)0730-8078

    Other

    OtherACM SIGMOD International Conference on Management of Data, SIGMOD 2015
    Country/TerritoryAustralia
    CityMelbourne
    Period5/31/156/4/15

    ASJC Scopus subject areas

    • Software
    • Information Systems

    Fingerprint

    Dive into the research topics of 'Collaborative access control in WebdamLog'. Together they form a unique fingerprint.

    Cite this