메뉴 건너뛰기




Volumn 73, Issue , 2001, Pages 245-258

Database security integration using role-based access control

Author keywords

Database integration; Role based access control; Security integration

Indexed keywords

DATABASE SYSTEMS; INTEGRATION;

EID: 84882787643     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 1
    • 84928693825 scopus 로고    scopus 로고
    • Merging heterogeneous security orderings
    • Martella Bertino, Kurth and Montolivo, editors, LNCS1146, Springer-Verlag
    • P.A. Bonatti, M.L. Sapino, and V.S Subrahmanian. Merging heterogeneous security orderings. In Martella Bertino, Kurth and Montolivo, editors, Computer Security - ESORICS96, LNCS1146, pages 183-197. Springer-Verlag, 1996.
    • (1996) Computer Security - ESORICS96 , pp. 183-197
    • Bonatti, P.A.1    Sapino, M.L.2    Subrahmanian, V.S.3
  • 3
    • 84904248063 scopus 로고
    • Oracle Corporation. Oracle Version 7, Chapters 6 & 7
    • Oracle Corporation. Oracle Version 7, Chapters 6 & 7. http://www.oracle.com/security/html/chap_6.html. 1995.
    • (1995)
  • 4
    • 84949776025 scopus 로고    scopus 로고
    • An authorization model for federated systems
    • Martella Bertino, Kurth and Montolivo, editors, LNCS 1146, Springer-Verlag
    • S. di Virmercati and P. Samarati. An authorization model for federated systems. In Martella Bertino, Kurth and Montolivo, editors, ESORICS96, LNCS 1146, pages 99-117. Springer-Verlag, 1996.
    • (1996) ESORICS96 , pp. 99-117
    • di Virmercati, S.1    Samarati, P.2
  • 9
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(1):3-33,1999.
    • (1999) ACM TISSEC , vol.2 , Issue.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.L.2
  • 11
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • LNCS1146, Springer Verlag
    • R. Sandhu. Role hierarchies and constraints for lattice-based access controls. In Computer Security - ESORICS 96, LNCS1146, pages 65-79. Springer Verlag, 1996.
    • (1996) Computer Security - ESORICS 96 , pp. 65-79
    • Sandhu, R.1
  • 13
    • 0025489261 scopus 로고
    • Federated database systems for managing distributed, heterogeneous, and autonomous databases
    • Sept
    • A.P. Sheth and J.A. Larson. Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys, 22(3): 183-236, Sept. 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.3 , pp. 183-236
    • Sheth, A.P.1    Larson, J.A.2
  • 14
    • 0010574338 scopus 로고    scopus 로고
    • Designing security agents for the dok federated system
    • Lin and Qian, editors, Chapman & Hall
    • Z. Tari. Designing security agents for the dok federated system. In Lin and Qian, editors, Database Security XI, pages 35-59. Chapman & Hall, 1997.
    • (1997) Database Security XI , pp. 35-59
    • Tari, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.