【24h】

Reverse Engineering of Database Security Policies

机译:数据库安全策略的逆向工程

获取原文

摘要

Security is a critical concern for any database. Therefore, database systems provide a wide range of mechanisms to enforce security constraints. These mechanisms can be used to implement part of the security policies requested of an organization. Nevertheless, security requirements are not static, and thus, implemented policies must be changed and reviewed. As a first step, this requires to discover the actual security constraints being enforced by the database and to represent them at an appropriate abstraction level to enable their understanding and reenginering by security experts. Unfortunately, despite the existence of a number of techniques for database reverse engineering, security aspects are ignored during the process. This paper aims to cover this gap by presenting a security metamodel and reverse engineering process that helps security experts to visualize and manipulate security policies in a vendor-independent manner.
机译:对于任何数据库,安全性都是至关重要的问题。因此,数据库系统提供了广泛的机制来强制执行安全性约束。这些机制可用于实施组织要求的部分安全策略。但是,安全性要求不是一成不变的,因此必须更改和审查已实施的策略。第一步,这需要发现数据库强制实施的实际安全约束,并以适当的抽象级别表示它们,以使安全专家能够理解和重新设计它们。不幸的是,尽管存在许多用于数据库逆向工程的技术,但是在此过程中安全性方面却被忽略了。本文旨在通过介绍安全元模型和逆向工程过程来弥补这一空白,该过程可帮助安全专家以独立于供应商的方式可视化和操纵安全策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号