LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Modeling XACML Security Policies Using Graph Databases

Photo by scottwebb from unsplash

XACML is a precise and complete access control language that defines an architecture to deploy access control services in a fine-grained way. However, when the number and complexity of policies… Click to show full abstract

XACML is a precise and complete access control language that defines an architecture to deploy access control services in a fine-grained way. However, when the number and complexity of policies increases, XACML suffers from performance problems. This problem has been analyzed by the research community, and the solutions proposed in the literature aim toward changing how security policies are stored. Many solutions do this by representing XACML policies in a graph data structure. However, these solutions increase performance but drastically decrease functionality. With this in mind, the authors developed a way of modeling and storing XACML policies in a graph database. One of the most striking features of this database is the high performance offered in operations over the data. Therefore, even if security policies are included in this database, the performance property is assured automatically. Moreover, due to the power of the engines and connectors this database offers, all the functions defined by XACML are available. To show our proposals viability, we designed a prototype.

Keywords: xacml security; modeling xacml; security policies; security; policies using; performance

Journal Title: IT Professional
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.