Databases are increasingly being used to store information covered by heterogeneous policies, which require support for access control with great flexibility. This has led to increasing interest in using fine-grained access control, where different cells in a relation may be governed by different access control rules. Although several proposals have been made to support fine-grained access control, there currently does not exist a formal notion of correctness regarding the query answering procedure. In this paper, we propose such a formal notion of correctness in fine-grained database access control, and discuss why existing approaches fall short in some circumstances. We then propose a labeling approach for masking unauthorized information...
Although database management systems (DBMSs) enforce access control according to a variety of models...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
We present algorithms for access rights control in multiuser, object-oriented databases. These algor...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
The fine-grained access control approaches in DBMSs should satisfy soundness property which requires...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
The current SQL standard for access control is coarse grained, in that it grants access to all rows ...
Fine Grained Access Control (FGAC) provides users the access to the non-confidential database inform...
This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics ...
Fine-grained access control is a conceptual approach to addressing database security requirements. I...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
We propose an approach for the selective enforcement of access control restrictions in, possibly dis...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Before the Web era, databases were well-protected by using the standard access control techniques su...
Information security is the protection of information against unauthorized disclosure, alteration or...
Although database management systems (DBMSs) enforce access control according to a variety of models...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
We present algorithms for access rights control in multiuser, object-oriented databases. These algor...
Databases are increasingly being used to store information covered by heterogeneous policies, which ...
The fine-grained access control approaches in DBMSs should satisfy soundness property which requires...
In this paper, we propose an observation-based fine grained access control (OFGAC) mechanism where da...
The current SQL standard for access control is coarse grained, in that it grants access to all rows ...
Fine Grained Access Control (FGAC) provides users the access to the non-confidential database inform...
This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics ...
Fine-grained access control is a conceptual approach to addressing database security requirements. I...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
We propose an approach for the selective enforcement of access control restrictions in, possibly dis...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Before the Web era, databases were well-protected by using the standard access control techniques su...
Information security is the protection of information against unauthorized disclosure, alteration or...
Although database management systems (DBMSs) enforce access control according to a variety of models...
International audienceEnsuring security of data is one of the fundamental needs of people. In this c...
We present algorithms for access rights control in multiuser, object-oriented databases. These algor...