A Policy Management Tool for Fine-Grained Database Access Control
نویسنده
چکیده
Database access control plays a central role in ensuring authorized access to sensitive information. As cross-organization information sharing becomes a must for the collaboration among corporations and governmental agencies, table-level or column-level database access control is no longer adequate. View-based approaches, on the other hand, require separate views for potentially large number of entities, which is not only costly, but also associated with consistency and integrity problems. Recently, row-level access control was proposed as an effective solution. Many commercial DBMSs have supported row-level access control. And they are widely employed in critical commercial and governmental information systems.
منابع مشابه
Seminar Report Fine-grained Access Control in Databases
Today, there are countless terabytes of data processed by IT systems, and we store a measurable portion of that data in the relational database management systems (RDBMS). Access control in these IT systems, is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table ...
متن کاملFormal Reasoning about Fine-Grained Access Control Policies
Nowadays, most of the main database management systems offer, in one way or another, the possibility of protecting data using fine-grained access control (FGAC) policies, i.e., policies that depend on dynamic properties of the system state. Reasoning about FGAC policies typically amounts to answering questions about whether a security-related property holds in a (possibly infinite) set of syste...
متن کاملOn Fine-Grained Access Control for XML
Fine-grained access control for XML is about controlling access to XML documents at the granularity of individual elements or attributes. This thesis addresses two problems related to XML access controls. The first is efficient, secure evaluation of XPath expressions. We present a technique that secures path expressions by means of query modification, and we show that the query modification alg...
متن کاملFine-grained Access-control for the Puppet Configuration Language
System configuration tools automate the configuration and management of IT infrastructures. However these tools fail to provide decent authorisation on configuration input. In this paper we apply fine-grained authorisation of individual changes on a complex input language of an existing tool. We developed a prototype that extracts meaningful changes from the language used in the Puppet tool. Th...
متن کاملFine-Grained Data Security in Virtual Organizations
Controlling the access to data based on user credentials is a fundamental part of database management systems. In most cases, the level at which information is controlled extends only to a certain level of granularity. In some scenarios, however, there is a requirement to control access at a more granular way allowing the users to see only the data they are supposed to see in a database table. ...
متن کامل