SQL Server 2000: Permissions on System Tables Granted to Logins Due to the Public Role
نویسنده
چکیده
______________________________________________________________
منابع مشابه
View security as the basis for data warehouse security
Access permissions in a data warehouse are currently managed in a separate world from the sources’ policies. The consequences are inconsistencies, slow response to change, and wasted administrative work. We present a different approach, which treats the sources’ exported tables and the warehouse as part of the same distributed database. Our main result is a way to control derived products by ex...
متن کاملDatabase Security System for Applying Sophisticated Access Control via Database Firewall Server
Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly...
متن کاملOverview of Scalable Distributed Database System SD-SQL Server
We present a scalable distributed database system SD-SQL Server. Its original feature is the scalable distributed partitioning of its relational tables. The system dynamically distributes the tables into segments created each at a different SD-SQL Server node. The partitioning is transparent to the applications. New segments result from splits following overflowing inserts. SD SQL Server avoids...
متن کاملThe CTU Prague Relational Learning Repository
The aim of the CTU Prague Relational Learning Repository is to support machine learning research with multi-relational data. The repository currently contains 50 SQL databases hosted on a public MySQL server located at relational.fit.cvut.cz. A searchable meta-database provides metadata (e.g., the number of tables in the database, the number of rows and columns in the tables, the number of fore...
متن کاملAccess-rights Analysis in the Presence of Subjects
Modern software development and run-time environments, such as Java and the Microsoft .NET Common Language Runtime (CLR), have adopted a declarative form of access control. Permissions are granted to code providers, and during execution, the platform verifies compatibility between the permissions required by a security-sensitive operation and those granted to the executing code. While convenien...
متن کامل