Current database systems apply access control mostly on tables and columns. However, many applications require access control on individual rows in database tables. Therefore, we have implemented a row-based access control mechanism. In our model for access control, object groups, in addition to user groups, are used to reduce the number of access rights to be defined. In this report, we describe the relational tables storing information for access control and explain how select, update, delete and insert operations are performed under access control. We also explain how access rights are managed
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Access-control mechanisms in distributed systems can differ greatly. For example, a data warehouse m...
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-...
During design of university information system we were faced with the problem to build so called acc...
The article deals with security policy for database objects where database object access is controll...
ABSTRACT: We present algorithms for access rights control in multiuser, object-oriented databases. T...
Information security is the protection of information against unauthorized disclosure, alteration or...
Providing security for a general-purpose database system is an expensive operation. An access contro...
This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics ...
We present algorithms for access rights control in multiuser, object-oriented databases. These algor...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012Role-based Access C...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Abstract. Nowadays security has become an important aspect in information systems engineering. A mai...
AbstractOnline personal health records (PHRs) enable patients to access, manage, and share certain o...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Access-control mechanisms in distributed systems can differ greatly. For example, a data warehouse m...
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-...
During design of university information system we were faced with the problem to build so called acc...
The article deals with security policy for database objects where database object access is controll...
ABSTRACT: We present algorithms for access rights control in multiuser, object-oriented databases. T...
Information security is the protection of information against unauthorized disclosure, alteration or...
Providing security for a general-purpose database system is an expensive operation. An access contro...
This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics ...
We present algorithms for access rights control in multiuser, object-oriented databases. These algor...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012Role-based Access C...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Abstract. Nowadays security has become an important aspect in information systems engineering. A mai...
AbstractOnline personal health records (PHRs) enable patients to access, manage, and share certain o...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
Among the variety of access control models proposed for database management systems (DBMSs) a key ro...
Access-control mechanisms in distributed systems can differ greatly. For example, a data warehouse m...
ABSTRACT: In a high level query and data manipulation language such as SQL, requests are stated non-...