This paper describes the use of formally specified RBAC policies for protecting federated relational database systems that are accessed over a wide area network. The method that is described combines a formally specified RBAC policy with both temporal and locational constraints. It does not depend on any security mechanism supported by a specific DBMS and is thus portable across platforms
Governmental and business organizations use the standard authorization model─ Role-based access cont...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
The paper describes authorization and access control in the IRO-DB database system, a system support...
A federated system is a collection of cooperating autonomous databases. Federated systems represent ...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Large and distributed access control systems are increasingly common, for example in health care. In...
The article deals with security policy for database objects where database object access is controll...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
International audienceBusiness logics of relational databases applications are an important source o...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
The underlying data model of many integrated information systems is a collection of inter-operable a...
Most of the security threats in relational database applications have their source in client-side sy...
Governmental and business organizations use the standard authorization model─ Role-based access cont...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...
Information security is of utmost concern in a multiuser environment. The importance of security is ...
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems ha...
The paper describes authorization and access control in the IRO-DB database system, a system support...
A federated system is a collection of cooperating autonomous databases. Federated systems represent ...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
The main feature of a secure information system is protecting sensitive data and services of an orga...
Large and distributed access control systems are increasingly common, for example in health care. In...
The article deals with security policy for database objects where database object access is controll...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
International audienceBusiness logics of relational databases applications are an important source o...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
The underlying data model of many integrated information systems is a collection of inter-operable a...
Most of the security threats in relational database applications have their source in client-side sy...
Governmental and business organizations use the standard authorization model─ Role-based access cont...
With the wide adoption of Internet, security of web database is a key issue. In web-based applicatio...
Information security is of utmost concern in a multiuser environment. The importance of security is ...