首页> 美国卫生研究院文献>other >Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach
【2h】

Query Monitoring and Analysis for Database Privacy - A Security Automata Model Approach

机译:数据库隐私的查询监视和分析-一种安全性自动机模型方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Privacy and usage restriction issues are important when valuable data are exchanged or acquired by different organizations. Standard access control mechanisms either restrict or completely grant access to valuable data. On the other hand, data obfuscation limits the overall usability and may result in loss of total value. There are no standard policy enforcement mechanisms for data acquired through mutual and copyright agreements. In practice, many different types of policies can be enforced in protecting data privacy. Hence there is the need for an unified framework that encapsulates multiple suites of policies to protect the data.We present our vision of an architecture named security automata model (SAM) to enforce privacy-preserving policies and usage restrictions. SAM analyzes the input queries and their outputs to enforce various policies, liberating data owners from the burden of monitoring data access. SAM allows administrators to specify various policies and enforces them to monitor queries and control the data access. Our goal is to address the problems of data usage control and protection through privacy policies that can be defined, enforced, and integrated with the existing access control mechanisms using SAM. In this paper, we lay out the theoretical foundation of SAM, which is based on an automata named Mandatory Result Automata. We also discuss the major challenges of implementing SAM in a real-world database environment as well as ideas to meet such challenges.
机译:当不同组织交换或获取有价值的数据时,隐私和使用限制问题很重要。标准访问控制机制限制或完全授予对有价值数据的访问权限。另一方面,数据混淆会限制整体可用性,并可能导致总价值损失。对于通过相互和版权协议获取的数据,没有标准的政策执行机制。实际上,可以在保护数据隐私方面实施许多不同类型的策略。因此,需要一个统一的框架,该框架封装了多套策略来保护数据。我们提出了一种名为安全自动机模型(SAM)的体系结构,以强制执行隐私保护策略和使用限制。 SAM分析输入查询及其输出以执行各种策略,从而使数据所有者摆脱监视数据访问的负担。 SAM允许管理员指定各种策略,并实施它们以监视查询并控制数据访问。我们的目标是通过隐私策略解决数据使用控制和保护的问题,隐私策略可以使用SAM定义,执行和集成到现有访问控制机制中。在本文中,我们基于称为“强制结果自动机”的自动机,奠定了SAM的理论基础。我们还将讨论在实际数据库环境中实施SAM的主要挑战,以及应对此类挑战的想法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号