
 
feasible because of the many ways data can be 
accessed, and different operations executed. 
Vimercati  et al. (2008) present that the chase 
process exploits a specific data structure, called 
tableau, to represent a query or a relation. It is 
usually adopted to study and identify functional 
dependencies within a relation schema, to check if a 
decomposition is lossy or lossless, to evaluate if the 
result of a query q
i 
is contained in the result of 
another query q
j
 (or vice versa) without explicitly 
computing the queries. When the verification returns 
false, the user receive no data, and the application 
must be change to comply with the rule. In RBAC 
approach, query is rewritten in order to return only 
data user has access. No error is returned, and the 
user receives only data he has access to. They 
propose a graph model approach to model 
authorization rule, database schema and queries, 
using authorization compositions and coloring the 
graph. This approach has the following drawbacks: 
it handles authorization for read operations (queries) 
and not write operations; it does not handle 
authorization on specific tuples of tables; it does not 
handle cyclic schemas, so it requires to remove all 
cycle from existing schemas which can be very 
expensive, and not feasible in practice. Medium and 
large companies usually cannot change their 
database to comply with this requirement. 
7 CONCLUSIONS 
Data access security is an important issue for 
enterprises. Authorization rules are traditionally 
implemented into IT applications, which define their 
own security policies and enforce them at the client 
layer. However, if a rule change, all applications that 
implemented the rule must be updated. So, it is a 
very complex problem in a scenario with lot o 
legacy systems. 
In order to improve this environment, there are 
solutions for authorization control on top of 
databases, such as Discretionary access control 
(DAC), Mandatory access control (MAC), and Role-
based access control (RBAC). However, such 
implementations are difficult to manage, thus 
requiring skilled professionals.  
In this work, we presented a flexible and easy to 
use framework for managing and controlling 
authorization rules of applications on top of 
corporative databases. The framework has two 
components (i) Authorization rule management 
(ARM) and (ii) Authorization rule execution (ARE). 
ARE component was implemented using Virtual 
Private Database (VPD) in Oracle, and evaluated 
using TPC-H Benchmark queries and data. The 
results showed the  effectiveness of the proposal. 
Further experiments are being conducted, beyond 
the scope of this work, addressing the performance 
impact of our proposal. 
As future work, we point the implementation of 
ARM and the evaluation of the ARE in a real 
scenario. For the first, we are evaluating if existing 
Business Rule Management System comply with 
ARM requirements. For the second, we are 
executing experimental tests in real scenarios. 
REFERENCES 
BRG, 2009. The Business Rules Group. http://www. 
businessrulesgroup.org/home-brg.shtml.  
Calì, A., Martinenghi, D. 2008. Querying data under 
access limitations. In ICDE 2008, Cancun.  
DoD, 1983, Trusted Computer Security Evaluation 
Criteria. Department of Defense, DoD 5200.28-STD. 
Ferraiolo, D., Khun, D. 1992, Role-Based Access Control. 
In: 15th Nat´l Computer Security Conf, pp. 554-563. 
Ferraiolo, D.F., Sandhu, R., et al., 2001, Proposed NIST 
standard for role-based access control. ACM 
Transactions on Information and System Security 4 
(3), pp. 224-274. 
Fischer et al., 2009, Fine-Grained Access Control with 
Object-Sensitive Roles, In: Drossopoulou (Ed.): 
ECOOP 2009, LNCS 5653, pp. 173–194  
Murthy, R., Sedlar, E., 2007. Flexible and efficient access 
control in oracle. In ACM SIGMOD 2007, pp. 973-
980, Beijing. 
ORACLE. 2003. Oracle Label Security Administrator's 
Guide.  Oracle Corporation. 
http://download.oracle.com/docs/cd/B14117_01/netwo
rk.101/b10774.pdf. 
ORACLE, 2008. Oracle Database Security Guide, Oracle 
RDBMS 10gR2. Oracle Corporation. http://download. 
oracle.com/docs/cd/B19306_01/network.102/b14266.p
df. 
SOX, 2009. Sarbanes-Oxley: Financial and Accounting 
Disclosure Information.  http://www.sarbanes-
oxley.com/section.php?level=1&pub_id=SOA-Manual 
TPCH,  2008. TPC Benchmark H Standard Specification 
Revision 2.8.0. Transaction Processing Perfermance 
Council.  http://www.tpc.org/tpch/spec/tpch2.8.0.pdf.  
Vimercati, S., Foresti, S. et al., P. 2008. Controlled 
information sharing in collaborative distributed query 
processing. In Proc. of ICDCS 2008, Beijing. 
Yang, L. 2009. Teaching database security and auditing. 
ACM SIGCSE 1(1), pp. 241—245. 
ICEIS 2010 - 12th International Conference on Enterprise Information Systems
280