Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
TRBAC: a temporal role-based access control model
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
Protecting deductive databases from unauthorized retrieval and update requests
Data & Knowledge Engineering - Data and applications security
Access Control for Deductive Databases by Logic Programming
ICLP '02 Proceedings of the 18th International Conference on Logic Programming
Access control in a relational data base management system by query modification
ACM '74 Proceedings of the 1974 annual conference - Volume 1
An Introduction to Database Systems
An Introduction to Database Systems
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 12th ACM symposium on Access control models and technologies
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Hi-index | 0.00 |
Standard SQL is insufficiently expressive for representing many access control policies that are needed in practice. Nevertheless, we show how rich forms of access control policies can be defined within SQL when small amounts of contextual information are available to query evaluators. Rather than the standard, relational structure perspective that has been adopted for fine-grained access control, we consider instead the representation of dynamic fine-grained access control (DFMAC) policy requirements at the access policy level. We also show how DFMAC policies may be represented in SQL and we give some performance results for an implementation of our approach.