ABAC Requirements Engineering for Database Applications

Jim Longstaff, Mengda He

Research output: Chapter in Book/Report/Conference proceedingConference contribution

244 Downloads (Pure)

Abstract

We show how complex privacy requirements can be represented and processed by an extended model of Attribute Based Access Control (ABAC), working with a simple database applications pattern. During application model development, most likely based on UML (e.g. Use Case, Class Diagrams), the analyst and possibly the end user specifies ABAC permissions, and then verifies their effect by running queries on the target data. The ABAC model supports positive and negative permissions, “break glass” overrides of negative permissions, and message/alert generation. The permissions combining algorithms are based on relational database optimisation, and permissions processing is implemented by query modification, producing structurally-optimised queries in an SQL-like language; the queries can then be processed by many database and big data systems. The method and models have been implemented in a prototype Privacy Preferences Tool in collaboration with a large medical records development, and we discuss experiences with focus group evaluations of this tool.
Original languageEnglish
Title of host publicationProceedings
Subtitle of host publication2019 13th International Symposium on Theoretical Aspects of Software Engineering
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages33 - 40
Number of pages8
ISBN (Electronic)9781728133423
ISBN (Print)9781728133423
DOIs
Publication statusPublished - 29 Jul 2019
EventThe 13th International Symposium on Theoretical Aspects of Software Engineering - Guilin, China
Duration: 29 Jul 20191 Aug 2019
http://www.se.gxnu.edu.cn/tase2019/

Conference

ConferenceThe 13th International Symposium on Theoretical Aspects of Software Engineering
Country/TerritoryChina
CityGuilin
Period29/07/191/08/19
Internet address

Fingerprint

Dive into the research topics of 'ABAC Requirements Engineering for Database Applications'. Together they form a unique fingerprint.

Cite this