Oracle to secure database access over the Net
โ Scribed by Thomas Kaneshige
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 127 KB
- Volume
- 1996
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
Databases hold much of the most sensitive and valuable data -information about customers, transactions, financial performance and human resources. Despite this, databases remain one of the least-protected areas in a company. While perimeter and network security measures create a barrier against some
In this paper, the approaches to introducing security policy into Role-Based Access Control (RBAC) and the Common Data Security Architecture (CDSA) are proposed. We apply security policy to a role's privileges in RBAC. An extended RBAC using PKI and roleassignment policy is described. The improved C
In this document, we show how linguistic tools and resources such as organized classes of verbs and their semantic representation contribute to a better database conceptual modelling of a domain. Organized verb semantic classes introduce a higher linguistic and cognitive adequacy and a greater flexi