Database security-concepts, approaches, and challenges

E Bertino, R Sandhu - IEEE Transactions on Dependable and …, 2005 - ieeexplore.ieee.org
As organizations increase their reliance on, possibly distributed, information systems for
daily business, they become more vulnerable to security breaches even as they gain …

Access control for databases: Concepts and systems

E Bertino, G Ghinita, A Kamra - Foundations and Trends® in …, 2011 - nowpublishers.com
As organizations depend on, possibly distributed, information systems for operational,
decisional and strategic activities, they are vulnerable to security breaches leading to data …

[KSIĄŻKA][B] Access Control in Data Management Systems: A Visual Querying Perspective

E Ferrari - 2022 - books.google.com
Access control is one of the fundamental services that any Data Management System should
provide. Its main goal is to protect data from unauthorized read and write operations. This is …

Self-organizing formation algorithm for active elements

K Fujibayashi, S Murata, K Sugawara… - 21st IEEE Symposium …, 2002 - ieeexplore.ieee.org
We propose a novel method of self-organizing formation. It is assumed that elements are not
connected to each other and they can move in continuous space. The objective is to arrange …

[HTML][HTML] A new secure 2PL real-time concurrency control algorithm (ES2PL)

E Abduljalil, F Thabit, O Can, PR Patil… - International Journal of …, 2022 - Elsevier
A secure concurrency control algorithms must be devoid of covert channels originating from
data conflicts between transactions, in addition to ensuring database integrity. Current …

Safe serializable secure scheduling: Transactions and the trade-off between security and consistency

I Sheff, T Magrino, J Liu, AC Myers… - Proceedings of the 2016 …, 2016 - dl.acm.org
Modern applications often operate on data in multiple administrative domains. In this
federated setting, participants may not fully trust each other. These distributed applications …

Performance evaluation of secure concurrency control algorithm for multilevel secure distributed database system

N Kaur, R Singh, AK Sarje… - … Conference on Information …, 2005 - ieeexplore.ieee.org
Majority of the research in multilevel secure database management systems (MLS/DBMS)
focuses primarily on centralized database systems. However, with the demand for higher …

A unified network security and fine-grained database access control model

L Pan - 2009 Second International Symposium on Electronic …, 2009 - ieeexplore.ieee.org
With the development of Internet and Intranet, Web and distributed databases have been
used more and more widely. It is important to properly handle network and Web database …

Using criterion-based access control for multilevel database security

L Pan - … International Symposium on Electronic Commerce and …, 2008 - ieeexplore.ieee.org
This paper presents a novel criterion-based access control approach to deal with multilevel
database security. In this approach, authorization rules are transformed to security criteria …

Transactional correctness for secure nested transactions

D Duggan, Y Wu - International Symposium on Trustworthy Global …, 2011 - Springer
Abstract Secure Nested Transactions are an adaptation of traditional nested transactions to
support the synergy of language-based security and multi-level database security. They …