User Authentication in Multidatabase Systems
نویسندگان
چکیده
The aspect of security needs more consideration in the area of architectures for multidatabase systems. Particularly, the authentication of users which is a main prerequisite for a successful authorization is not considered sufficiently in current architectures. Due to the autonomy and heterogeneity of the component database systems, the problem of authentication in multidatabase systems is more complex than in traditional database systems. In this paper, we discuss the foundations and prerequisites for architectures of authentication in multidatabase systems. We present several approaches with respect to different degrees of autonomy and heterogeneity. Especially, we work out the authentication process and show the advantages compared with related approaches.
منابع مشابه
QUICK: Graphical User Interface to Multiple Databases
Wang Chiew Tan Nat'l Univ of Singapore Singapore 119260 Email: [email protected] Ke Wang Nat'l Univ of Singapore Singapore 119260 Email: [email protected] Limsoon Wong Inst of Systems Science Singapore 119597 Email: [email protected] Abstract Formulating queries to access multiple databases can be a formidable task, especially when many terms from various databases and complex constraints a...
متن کاملSmart City Reference Model: Interconnectivity for On-Demand User to Service Authentication
The Internet of Things and Services (IoTS) has encouraged the development of service provisioning systems in respect to Smart City topics. Most of them are operated as heterogeneous systems which limits end customers’ access and contradicts with IoTS principles. In this paper, we discuss and develop a reference model of an interconnected service marketplace ecosystem. The prototypical implement...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملExtending a Multidatabase Manipulation Language to Resolve Schema and Data Conflicts
The management of Multidatabase Systems (MDBS) is complicated by possible structural and semantic heterogeneity of the member database systems, and the requirements to preserve their local autonomy. Semantic heterogeneity is concerned with the di erences in the meaning and interpretation of similar data objects across the di erent systems. In loosely coupled database federations, static schema ...
متن کامل