International audienceThe purpose of the work described in this article is to use database security mechanism as a data access control model in a Java application, developed through an UML-based process. This work relies on the CASE tool Designer from the Oracle company and its associated user and security policy. The three axis of this work are the following ones : • Introducing class diagrams towards Designer analysis and design models (entity-relation ship diagram, design diagrams). • Using Designer features to design user and security policy, and generate database schema. • Reconciling object-oriented and relational worlds through the use of TopLink, an object-relational mapping tool and with the exploitation of a dedicated generator, i...
In web applications, databases are generally used as data repositories, where a server-side program ...
Recently most organizations have developed so much that the amount of data flowing through them has ...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Nowadays database ...
International audienceThe purpose of the work described in this article is to use database security ...
In this age of increased networking of computers and larger repositories of data, users more and mor...
In the development process of application systems, the most important works are analysis and design....
Providing security for a general-purpose database system is an expensive operation. An access contro...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012Role-based Access C...
The article deals with security policy for database objects where database object access is controll...
In recent years, there has been a demand for Web applications with complex functions. In addition, m...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
International audienceBusiness logics of relational databases applications are an important source o...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Security for software applications involves defining what needs to be protected (security policy), a...
International audienceBusiness logics of relational databases applications are an important source o...
In web applications, databases are generally used as data repositories, where a server-side program ...
Recently most organizations have developed so much that the amount of data flowing through them has ...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Nowadays database ...
International audienceThe purpose of the work described in this article is to use database security ...
In this age of increased networking of computers and larger repositories of data, users more and mor...
In the development process of application systems, the most important works are analysis and design....
Providing security for a general-purpose database system is an expensive operation. An access contro...
Project (M.S., Computer Science) -- California State University, Sacramento, 2012Role-based Access C...
The article deals with security policy for database objects where database object access is controll...
In recent years, there has been a demand for Web applications with complex functions. In addition, m...
Computer security has become a crucial issue in recent years. More than ever, computer scientists, d...
International audienceBusiness logics of relational databases applications are an important source o...
As organizations depend on, possibly distributed, information systems for operational, decisional an...
Security for software applications involves defining what needs to be protected (security policy), a...
International audienceBusiness logics of relational databases applications are an important source o...
In web applications, databases are generally used as data repositories, where a server-side program ...
Recently most organizations have developed so much that the amount of data flowing through them has ...
Project (M.S., Computer Science) -- California State University, Sacramento, 2009.Nowadays database ...