作者
Kevin Eykholt, Atul Prakash, Barzan Mozafari
发表日期
2017
研讨会论文
26th USENIX Security Symposium (USENIX Security 17)
页码范围
1445-1462
简介
Database-backed applications rely on access control policies based on views to protect sensitive data from unauthorized parties. Current techniques assume that the application’s database tables contain a column that enables mapping a user to rows in the table. This assumption allows database views or similar mechanisms to enforce per-user access controls. However, not all database tables contain sufficient information to map a user to rows in the table, as a result of database normalization, and thus, require the joining of multiple tables. In a survey of 10 popular open-source web applications, on average, 21% of the database tables require a join. This means that current techniques cannot enforce security policies on all update queries for these applications, due to a well-known view update problem.
引用总数
2018201920202021202220232111
学术搜索中的文章
K Eykholt, A Prakash, B Mozafari - 26th USENIX Security Symposium (USENIX Security …, 2017