Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions between data managed by different users, and can lead to unexpected results if not carefully written and analyzed. We propose the use of Transaction Datalog syntax and semantics as a formal framework for expressing reflective access control policies. Using a formal logic-based language provides a basis for analyzing policies and enables secure implementations that can guarantee that certain confi...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
The Resource Description Framework (RDF) is an interoperable data representation format suitable for...
Business logics of relational databases applications are an important source of security violations,...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
Nowadays security has become an important aspect in information systems engineering. A mainstream me...
Information security is the protection of information against unauthorized disclosure, alteration or...
Most of the security threats in relational database applications have their source in client-side sy...
International audienceThe Resource Description Framework (RDF) is an interoperable data representati...
This paper describes the use of formally specified RBAC policies for protecting federated relationa...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
학위논문 (박사)-- 서울대학교 대학원 : 컴퓨터공학부, 2013. 2. 염헌영.With the growth in information access, comes the challe...
Business logics of relational databases applications are an important source of security violations,...
Protecting confidential information in relational databases while ensuring availability of public i...
Abstract. The SQL standard specifies authorization via a large set of rather opaque rules, which are...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
The Resource Description Framework (RDF) is an interoperable data representation format suitable for...
Business logics of relational databases applications are an important source of security violations,...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as ...
Nowadays security has become an important aspect in information systems engineering. A mainstream me...
Information security is the protection of information against unauthorized disclosure, alteration or...
Most of the security threats in relational database applications have their source in client-side sy...
International audienceThe Resource Description Framework (RDF) is an interoperable data representati...
This paper describes the use of formally specified RBAC policies for protecting federated relationa...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
학위논문 (박사)-- 서울대학교 대학원 : 컴퓨터공학부, 2013. 2. 염헌영.With the growth in information access, comes the challe...
Business logics of relational databases applications are an important source of security violations,...
Protecting confidential information in relational databases while ensuring availability of public i...
Abstract. The SQL standard specifies authorization via a large set of rather opaque rules, which are...
Companies and organizations collect and use vast troves of sensitive user data whose release must be...
The Resource Description Framework (RDF) is an interoperable data representation format suitable for...
Business logics of relational databases applications are an important source of security violations,...