RBAC policy implementation for SQL databases

被引:0
|
作者
Barker, S [1 ]
Douglas, P [1 ]
机构
[1] Kings Coll London, London WC2R 2LS, England
关键词
RBAC; SQL; internet database;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how specifications of role-based access control (RBAC) and temporal role-based access control (TRBAC) policies in a logic language may be used in practical implementations of access control policies for protecting the information in SQL databases from unauthorized retrieval and update requests. Performance results for an implementation of a variety of RBAC policies for protecting an SQL databases and some optimization methods that may be used in implementations are described.
引用
收藏
页码:288 / 301
页数:14
相关论文
共 50 条
  • [1] Protecting federated databases using a practical implementation of a formal RBAC policy
    Barker, S
    Douglas, P
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 523 - 527
  • [2] Conformance checking of RBAC policy and its implementation
    Hansen, F
    Oleshchuk, V
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 144 - 155
  • [3] Analyzing RBAC Security Policy of Implementation Using AST
    Tuan-Hung Pham
    Ninh-Thuan Truong
    Viet-Ha Nguyen
    [J]. INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 215 - 219
  • [4] Implementation of fuzzy classification in relational databases using conventional SQL querying
    Veryha, Y
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2005, 47 (05) : 357 - 364
  • [5] Implementation of Projected Clustering based on SQL queries and UDFs in Relational Databases
    Harikumar, Sandhya
    Haripriya, H.
    Kaimal, M. R.
    [J]. 2013 IEEE RECENT ADVANCES IN INTELLIGENT COMPUTATIONAL SYSTEMS (RAICS), 2013, : 7 - 12
  • [6] Databases, tuples, and SQL
    Kabachinski, Jeff
    [J]. Biomedical Instrumentation and Technology, 2008, 42 (05): : 385 - 387
  • [7] MULTIUSER DATABASES - THE SQL
    FINKELSTEIN, R
    [J]. BYTE, 1990, 15 (05): : 136 - &
  • [8] Design and Implementation of a CIM-SPL Based RBAC Policy Language
    Cao, Yanming
    Pan, Li
    [J]. MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 126 - 131
  • [9] RBAC with ABS Implementation Practicalities for RBAC Integrity Policies
    Kiviharju, Mikko
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 500 - 509
  • [10] Intrusion detection in RBAC-administered databases
    Bertino, E
    Kamra, A
    Terzi, E
    Vakali, A
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 155 - 164