Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Consistency and enforcement of access rules in cooperative data sharing environment
Le M., Kant K., Jajodia S. Computers and Security41 3-18,2014.Type:Article
Date Reviewed: Jul 15 2014

Modern businesses require online multipart collaboration to efficiently service their clients, and this requirement forces them to allow collaborating businesses to access their data. The immediate consequence is that the collaborating businesses routinely combine (join) their data with data that belong to several other parties. At the same time, all of the collaborating parties legitimately pose access constraints and combination (join) constraints to all other parties for their data, in an effort to maintain the usability and collaborative force of information sharing.

Now here lies the catch: you may have access to more than what each collaborating party has allowed you to access, or conversely, ill-posed business rules from the parties may translate into the inaccessibility of useful combinations of data.

This fine paper examines in detail how a consistent group of access rules can be formulated for all parties, starting with the access rules that each party formulates for its own data. Several algorithms are developed in the paper to build the group of access rules and then check it both for consistency and enforceability (in the words of the authors, “the adequacy of the rules in answering the authorized queries”). The authors also address issues like algorithmic complexity and how to efficiently handle access rules that are dynamically granted or revoked by a collaborating party.

The subject is modern and well analyzed in this paper (which is slightly wordy at times). The reader needs to refresh his or her knowledge of relational algebra, graph theory, and relational databases in order to follow the reasoning with ease. The paper is a notable contribution to the literature on secure cooperative data sharing, and will be useful to relational database professionals, even though it has a strong theoretical character.

Reviewer:  Constantin S. Chassapis Review #: CR142508 (1410-0882)
Bookmark and Share
 
Data Sharing (H.3.5 ... )
 
 
Graphs And Networks (E.1 ... )
 
 
Relational Databases (H.2.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Sharing": Date
Issues in online database searching
Tenopir C., Libraries Unlimited, Inc., Englewood, CO, 1989. Type: Book (9789780872877092)
Aug 1 1990
Sharing scientific data
Sterling T., Weinkam J. Communications of the ACM 33(9): 112-119, 1990. Type: Article
Mar 1 1991
Data caching issues in an information retrieval system
Alonso R., Barbara D., Garcia-Molina H. ACM Transactions on Database Systems 15(3): 359-384, 1990. Type: Article
Mar 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy