Database Specification and Access
نویسندگان
چکیده
In this report we present the web interface we designed and implemented to make our data on P2P activity more accessible. In particular, this interface makes data browsable from files to related users, and conversely. Moreover, this interface was enriched with precomputed information, like lists of files of interest for a given user, list of users providing a given file, list of queries entered by a given user, list of names of a given file, etc. Finally, we included our content rating and fake detection system in this interface, which indicates if a file should be considered as having pornographic or paedophile content, and/or as being a fake.
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملA hybrid approach for database intrusion detection at transaction and inter-transaction levels
Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملAn automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملAn Authorization Framework for Database Systems
Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...
متن کاملAn Access Specification Language for a Relational Data Base System
Evidently, the absence of access path specification places a heavy burden on the implementors of a compiler for such a language. The compilation algorithm must take into account the characteristics of the various access paths existing in the data base. Ideally, the compiler should act as an automatic programmer who, according to the physical characteristics of the data base, chooses an over...
متن کامل