Fine Grained Access Control (FGAC) provides users the access to the non-confidential database information while preventing unauthorized leakage of the confidential data. It provides two extreme views to the database information: completely public or completely hidden. In this paper, we propose an Observation-based Fine Grained Access Control (OFGAC) mechanism based on the Abstract Interpretation framework where data are made ccessible at various level of abstraction. In this setting, unauthorized users are not able to infer the exact content of a cell containing confidential information, while they are allowed to get partial information out of it, according to their access rights. Different level of sensitivity of the information correspo...
Access control management techniques can reduce the risk of data exfiltration while making privacy-t...
Abstract. In a database system, authorization-based access-control is generally the first line of de...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...
Fine Grained Access Control (FGAC) provides users the access to the non-confidential database inform...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where d...
The eXtensible Markup Language (XML) is recognized as a simple and universal standard for storing an...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
This paper analyzes different techniques of the fine grained security of relational databases for th...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Information security is the protection of information against unauthorized disclosure, alteration or...
Before the Web era, databases were well-protected by using the standard access control techniques su...
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to ...
Access control management techniques can reduce the risk of data exfiltration while making privacy-t...
Abstract. In a database system, authorization-based access-control is generally the first line of de...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...
Fine Grained Access Control (FGAC) provides users the access to the non-confidential database inform...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where d...
The eXtensible Markup Language (XML) is recognized as a simple and universal standard for storing an...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
This paper analyzes different techniques of the fine grained security of relational databases for th...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Information security is the protection of information against unauthorized disclosure, alteration or...
Before the Web era, databases were well-protected by using the standard access control techniques su...
Traditional techniques of enforcing an access control policy rely on an honest reference monitor to ...
Access control management techniques can reduce the risk of data exfiltration while making privacy-t...
Abstract. In a database system, authorization-based access-control is generally the first line of de...
In general, access control mechanisms in DBMSs ensure that users access only those portions of data ...