DocumentCode :
635272
Title :
Implementing database access control policy from unconstrained natural language text
Author :
Slankas, John
Author_Institution :
Dept. of Comput. Sci., North Carolina State Univ., Raleigh, NC, USA
fYear :
2013
fDate :
18-26 May 2013
Firstpage :
1357
Lastpage :
1360
Abstract :
Although software can and does implement access control at the application layer, failure to enforce data access at the data layer often allows uncontrolled data access when individuals bypass application controls. The goal of this research is to improve security and compliance by ensuring access controls rules explicitly and implicitly defined within unconstrained natural language texts are appropriately enforced within a system´s relational database. Access control implemented in both the application and data layers strongly supports a defense in depth strategy. We propose a tool-based process to 1) parse existing, unaltered natural language documents; 2) classify whether or not a statement implies access control and whether or not the statement implies database design; and, as appropriate, 3) extract policy elements; 4) extract database design; 5) map data objects found in the text to a database schema; and 6) automatically generate the necessary SQL commands to enable the database to enforce access control. Our initial studies of the first three steps indicate that we can effectively identify access control sentences and extract the relevant policy elements.
Keywords :
authorisation; natural language processing; relational databases; SQL commands; access controls rules; application controls; application layer; compliance; data layer; database access control policy; database design; database schema; map data objects; relational database; security; software; unaltered natural language documents; unconstrained natural language text; uncontrolled data access; Access control; Databases; Natural languages; Ontologies; Process control; Semantics; Security; access control; classification; natural language parsing; persistence; policy; role based access control;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Engineering (ICSE), 2013 35th International Conference on
Conference_Location :
San Francisco, CA
Print_ISBN :
978-1-4673-3073-2
Type :
conf
DOI :
10.1109/ICSE.2013.6606716
Filename :
6606716
Link To Document :
بازگشت