This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics and REtrieval S~stem). The scheme can be applied to any relational data base management system and has several advantages over other suggested schemes. These include: a) implementation ease b) small execution time overhead c) powerful and flexible controls d) conceptual simplicity The basic idea utilized is that a user interaction with the data base is modified to an alternate form which is guaranteed to have no access violations. This modification takes place in a high leve
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Although database management systems (DBMSs) enforce access control according to a variety of models...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...
Current database systems apply access control mostly on tables and columns. However, many applicatio...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-...
AbstractOnline personal health records (PHRs) enable patients to access, manage, and share certain o...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
The article deals with security policy for database objects where database object access is controll...
Information security is the protection of information against unauthorized disclosure, alteration or...
This dissertation considers the use of a virtual machine as an access control mechanism in a relatio...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
ABSTRACT: We present algorithms for access rights control in multiuser, object-oriented databases. T...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Although database management systems (DBMSs) enforce access control according to a variety of models...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...
Current database systems apply access control mostly on tables and columns. However, many applicatio...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-...
AbstractOnline personal health records (PHRs) enable patients to access, manage, and share certain o...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
The article deals with security policy for database objects where database object access is controll...
Information security is the protection of information against unauthorized disclosure, alteration or...
This dissertation considers the use of a virtual machine as an access control mechanism in a relatio...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
ABSTRACT: We present algorithms for access rights control in multiuser, object-oriented databases. T...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Although database management systems (DBMSs) enforce access control according to a variety of models...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...