Reverse Engineering of Database Security Policies

  • Salvador Martínez
  • Valerio Cosentino
  • Jordi Cabot
  • Frédéric Cuppens
Conference paper

DOI: 10.1007/978-3-642-40173-2_37

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8056)
Cite this paper as:
Martínez S., Cosentino V., Cabot J., Cuppens F. (2013) Reverse Engineering of Database Security Policies. In: Decker H., Lhotská L., Link S., Basl J., Tjoa A.M. (eds) Database and Expert Systems Applications. DEXA 2013. Lecture Notes in Computer Science, vol 8056. Springer, Berlin, Heidelberg

Abstract

Security is a critical concern for any database. Therefore, database systems provide a wide range of mechanisms to enforce security constraints. These mechanisms can be used to implement part of the security policies requested of an organization. Nevertheless, security requirements are not static, and thus, implemented policies must be changed and reviewed. As a first step, this requires to discover the actual security constraints being enforced by the database and to represent them at an appropriate abstraction level to enable their understanding and reenginering by security experts. Unfortunately, despite the existence of a number of techniques for database reverse engineering, security aspects are ignored during the process. This paper aims to cover this gap by presenting a security metamodel and reverse engineering process that helps security experts to visualize and manipulate security policies in a vendor-independent manner.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Salvador Martínez
    • 1
  • Valerio Cosentino
    • 1
  • Jordi Cabot
    • 1
  • Frédéric Cuppens
    • 2
  1. 1.ATLANMOD, & École des Mines de Nantes, INRIA, LINANantesFrance
  2. 2.Télécom BretagneUniversité Européenne de BretagneCesson SévignéFrance

Personalised recommendations