Strong and Provably Secure Database Access Control
Abstract
Existing SQL access control mechanisms are extremely limited. Attackers can leak information and escalate their privileges using advanced database features such as views, triggers, and integrity constraints. This is not merely a problem of vendors lagging behind the state-of-the-art. The theoretical foundations for database security lack adequate security definitions and a realistic attacker model, both of which are needed to evaluate the security of modern databases. We address these issues and present a provably secure access control mechanism that prevents attacks that defeat popular SQL database systems.
- Publication:
-
arXiv e-prints
- Pub Date:
- December 2015
- DOI:
- 10.48550/arXiv.1512.01479
- arXiv:
- arXiv:1512.01479
- Bibcode:
- 2015arXiv151201479G
- Keywords:
-
- Computer Science - Cryptography and Security;
- Computer Science - Databases
- E-Print:
- A short version of this paper has been published in the proceedings of the 1st IEEE European Symposium on Security and Privacy (EuroS&