Policy-Driven Role-Based Database Access Control
ثبت نشده
چکیده
In this paper, firstly, we point out that access control mechanisms are not suitable in existing commercial Relational Data Base Management Systems (RDBMS). Secondly, the idea of Policy-Driven Role-Based Database Access Control (PDRBDAC) is proposed. Thirdly, the issue of multiple inheritance in a role hierarchy is discussed. Finally, a PROLOG interpreting algorithm for dealing with it is described.
منابع مشابه
Integrating Policy-Driven Role Based Access Control with the Common Data Security Architecture
This paper shows how Policy-Driven Role-Based Access Control (PDRBAC) techniques can be used to extend the Common Data Security Architecture (CDSA). The extensions provide constraint-based access control and are implemented using a flexible policy description language and a new trust policy enforcement mechanism. The expressiveness of the policy description language is demonstrated by examples ...
متن کاملRole-Based Access Control Mechanisms Distributed, Statically Implemented and Driven by CRUD Expressions
Most of the security threats in relational database applications have their source in client-side systems when they issue requests formalized by Create, Read, Update and Delete (CRUD) expressions. If tools such as ODBC and JDBC are used to develop business logics, then there is another source of threats. In some situations the content of data sets retrieved by Select expressions can be modified...
متن کاملTrusted Database Interoperation Based on Collaborative Role-Based Access Control
The increasing development of distributed application has led to the widespread involvement of database interconnection. Information sharing through the interconnection requires a new type of access control beyond local-only access control scheme: we need to consider the relationship among organizations and a collaborative application. In this paper, we describe an access control framework for ...
متن کاملModel-Driven Role-Based Access Control for Oracle Database
With the constant march towards a paperless business environment, database systems are increasingly being used to hold more and more sensitive information. This means they present an increasingly valuable target for attackers. A mainstream method for information system security is Role-based Access Control (RBAC), which restricts system access to authorised users. However the implementation of ...
متن کاملCore Role Based Access Control (RBAC) mechanism for MySQL
RBAC or Role-Based Access Control is an approach to restrict system access to authorized users and help in implementing a secure access control for larger databases. MySQL is a popular open source relational database management system (RDBMS) which currently implements MAC and DAC access control mechanisms. We extend the access control policies in MySQL by adding the Core RBAC functionality to it.
متن کامل