Skip to main navigation Skip to search Skip to main content

Anomaly discovery and resolution in MySQL access control policies

  • Mohamed Shehab*
  • , Saeed Al-Haj
  • , Salil Bhagurkar
  • , Ehab Al-Shaer
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Managing hierarchical and fine grained DBMS policies for a large number of users is a challenging task and it increases the probability of introducing misconfigurations and anomalies. In this paper, we present a formal approach to discover anomalies in database policies using Binary Decision Diagrams (BDDs) which allow finer grain analysis and scalability. We present and formalize intra-table and inter-table redundancy anomalies using the popular MySQL database server as a case study. We also provide a mechanism for improving the performance of policy evaluation by upgrading rules from one grant table to another grant table. We implemented our proposed approach as a tool called MySQLChecker. The experimental results show the efficiency of MySQLChecker in finding and resolving policy anomalies.

Original languageEnglish
Title of host publicationDatabase and Expert Systems Applications - 23rd International Conference, DEXA 2012, Proceedings
PublisherSpringer Verlag
Pages514-522
Number of pages9
EditionPART 2
ISBN (Print)9783642325960
DOIs
StatePublished - 2012
Externally publishedYes
Event23rd International Conference on Database and Expert Systems Applications, DEXA 2012 - Vienna, Austria
Duration: 3 Sep 20126 Sep 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 2
Volume7447 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference23rd International Conference on Database and Expert Systems Applications, DEXA 2012
Country/TerritoryAustria
CityVienna
Period3/09/126/09/12

Keywords

  • Access Control
  • Anomaly Detection
  • Policy
  • Policy Analysis

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Anomaly discovery and resolution in MySQL access control policies'. Together they form a unique fingerprint.

Cite this