Access Control in Data Management Systems
โ Scribed by Elena Ferrari
- Publisher
- Morgan & Claypool
- Year
- 2010
- Tongue
- English
- Leaves
- 117
- Series
- Synthesis Lectures on Data Management
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends.
โฆ Table of Contents
Acknowledgments......Page 11
Preface......Page 13
Historical Prospective......Page 15
Data Protection......Page 16
Basic Components......Page 17
Access Control Policies......Page 18
Authorization Subjects......Page 20
Authorizations: Further Components......Page 21
Administration Policies......Page 23
Access Control Models......Page 24
The Access Matrix Model......Page 25
The System R Access Control Model......Page 27
GRANT Command......Page 28
REVOKE Command......Page 30
Authorization Storage......Page 31
Authorization Management and Enforcement......Page 32
Recursive Revocation......Page 33
Authorizations on Views......Page 36
DAC Support in SQL......Page 39
Extensions to the System R Access Control Model......Page 40
Positive and Negative Authorizations......Page 41
Temporal Authorizations......Page 43
Oracle Virtual Private Database......Page 44
Access Control for Object DMSs......Page 51
Access Control for XML Data......Page 53
Access Control Requirements......Page 54
Access Control Models......Page 55
Efficiency of Access Control......Page 60
Mandatory Access Control......Page 63
Bell and LaPadula Model......Page 64
Multilevel Relational Data Model......Page 68
Mandatory Access Control for Object DMSs......Page 70
MAC vs DAC......Page 71
Information-flow Control Models......Page 73
Role-based Access Control......Page 75
Core RBAC......Page 76
Hierarchical RBAC......Page 78
Constrained RBAC......Page 79
RBAC Support in SQL......Page 81
Role Administration......Page 84
RBAC Extensions......Page 88
Access Control under the Database as a Service Model......Page 91
Access Control for Data Stream Management Systems......Page 94
OSN Access Control Requirements......Page 96
Proposed Solutions......Page 97
Further Research Directions in Access Control......Page 99
Bibliography......Page 103
Author's Biography......Page 117
๐ SIMILAR VOLUMES
This textbook introduces new business concepts on cloud environments such as secure, scalable anonymity and practical payment protocols for the Internet of things and Blockchain technology. The protocol uses electronic cash for payment transactions. In this new protocol, from the viewpoint of banks,
<p><P><STRONG>Access Control Systems: Security, Identity Management and Trust Models</STRONG> provides a thorough introduction to the foundations of programming systems security, delving into identity management, trust models, and the theory behind access control models. The book details access cont
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources against unauthorized viewing, tampering, or destruction. These systems serve as a primary means of ensuring privacy, conf