RBAC policy implementation for SQL databases

被引:0
|
作者
Barker, S [1 ]
Douglas, P [1 ]
机构
[1] Kings Coll London, London WC2R 2LS, England
关键词
RBAC; SQL; internet database;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how specifications of role-based access control (RBAC) and temporal role-based access control (TRBAC) policies in a logic language may be used in practical implementations of access control policies for protecting the information in SQL databases from unauthorized retrieval and update requests. Performance results for an implementation of a variety of RBAC policies for protecting an SQL databases and some optimization methods that may be used in implementations are described.
引用
收藏
页码:288 / 301
页数:14
相关论文
共 50 条
  • [41] SQL queries over encrypted databases: a survey
    Sun, Bo
    Zhao, Sen
    Tian, Guohua
    [J]. CONNECTION SCIENCE, 2024, 36 (01)
  • [42] Continuous Deployment and Schema Evolution in SQL Databases
    de Jong, Michael
    van Deursen, Arie
    [J]. 2015 IEEE/ACM 3RD INTERNATIONAL WORKSHOP ON RELEASE ENGINEERING, 2015, : 16 - 19
  • [43] Bringing SQL databases to key-based NoSQL databases: a canonical approach
    Geomar A. Schreiner
    Denio Duarte
    Ronaldo dos Santos Mello
    [J]. Computing, 2020, 102 : 221 - 246
  • [44] Bringing SQL databases to key-based NoSQL databases: a canonical approach
    Schreiner, Geomar A.
    Duarte, Denio
    Mello, Ronaldo dos Santos
    [J]. COMPUTING, 2020, 102 (01) : 221 - 246
  • [45] Design and Implementation of the RBAC-SOA Model
    Qu, Zhaoyang
    Meng, Na
    [J]. ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2945 - +
  • [46] Design and Implementation of Authorization System Based on RBAC
    Li, Furong
    Wu, Haitao
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL I, 2015, : 502 - 504
  • [47] An implementation of a secure version of NFS including RBAC
    Ashley, P
    Broom, B
    Vandenwauver, M
    [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 213 - 227
  • [48] An RBAC-based policy information base
    Squair, TE
    Jamhour, E
    Nabhen, RC
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 171 - 180
  • [49] The RBAC model integrated with policy in grid environment
    Chen Jiangang
    Wang Ruchuan
    Wang Haiyan
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04) : 588 - 592
  • [50] Formalization of RBAC policy with object class hierarchy
    Chae, Jung Hwa
    Shiri, Nematollaah
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 162 - +