SQL Server 2000: Permissions on System Tables Granted to Logins Due to the Public Role

نویسنده

  • K Brian Kelley
چکیده

______________________________________________________________

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

View security as the basis for data warehouse security

Access permissions in a data warehouse are currently managed in a separate world from the sources’ policies. The consequences are inconsistencies, slow response to change, and wasted administrative work. We present a different approach, which treats the sources’ exported tables and the warehouse as part of the same distributed database. Our main result is a way to control derived products by ex...

متن کامل

Database Security System for Applying Sophisticated Access Control via Database Firewall Server

Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly...

متن کامل

Overview of Scalable Distributed Database System SD-SQL Server

We present a scalable distributed database system SD-SQL Server. Its original feature is the scalable distributed partitioning of its relational tables. The system dynamically distributes the tables into segments created each at a different SD-SQL Server node. The partitioning is transparent to the applications. New segments result from splits following overflowing inserts. SD SQL Server avoids...

متن کامل

The CTU Prague Relational Learning Repository

The aim of the CTU Prague Relational Learning Repository is to support machine learning research with multi-relational data. The repository currently contains 50 SQL databases hosted on a public MySQL server located at relational.fit.cvut.cz. A searchable meta-database provides metadata (e.g., the number of tables in the database, the number of rows and columns in the tables, the number of fore...

متن کامل

Access-rights Analysis in the Presence of Subjects

Modern software development and run-time environments, such as Java and the Microsoft .NET Common Language Runtime (CLR), have adopted a declarative form of access control. Permissions are granted to code providers, and during execution, the platform verifies compatibility between the permissions required by a security-sensitive operation and those granted to the executing code. While convenien...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003