IEEE Transactions on Software Engineering
Representing database programs as objects
Advances in database programming languages
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
The ANSI binding of SQL to ADA
ACM SIGAda Ada Letters
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
SQLJ Part 1: SQL routines using the Java programming language
ACM SIGMOD Record
Component-based software engineering: putting the pieces together
Component-based software engineering: putting the pieces together
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
AspectJ in Action: Practical Aspect-Oriented Programming
AspectJ in Action: Practical Aspect-Oriented Programming
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
SQL DOM: compile time checking of dynamic SQL statements
Proceedings of the 27th international conference on Software engineering
Safe query objects: statically typed objects as remotely executable queries
Proceedings of the 27th international conference on Software engineering
JDBC Recipes: A Problem-Solution Approach (Problem-Solution Approach)
JDBC Recipes: A Problem-Solution Approach (Problem-Solution Approach)
KALA: Kernel Aspect language for advanced transactions
Proceedings of the 2006 ACM symposium on Applied computing
LINQ: reconciling object, relations and XML in the .NET framework
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach
Cross-tier, label-based security enforcement for web applications
Proceedings of the 2009 ACM SIGMOD International Conference on Management of data
Links: web programming without tiers
FMCO'06 Proceedings of the 5th international conference on Formal methods for components and objects
Differential privacy: a survey of results
TAMC'08 Proceedings of the 5th international conference on Theory and applications of models of computation
Privacy integrated queries: an extensible platform for privacy-preserving data analysis
Communications of the ACM
Java Persistence with JPA
Murach's ADO.NET 4 Database Programming with C# 2010
Murach's ADO.NET 4 Database Programming with C# 2010
Mappings make data processing go 'round
GTTSE'05 Proceedings of the 2005 international conference on Generative and Transformational Techniques in Software Engineering
Access control: principle and practice
IEEE Communications Magazine
Hi-index | 0.00 |
Currently, business tiers for relational database applications are mostly built from software artifacts, among which Java Persistent API, Java Database Connectivity and LINQ are three representatives. Those software artifacts were mostly devised to address the impedance mismatch between the object-oriented and the relational paradigms. Key aspects as reusable business tier components and access control to data residing inside relational databases have not been addressed. To tackle the two aspects, this research proposes an architecture, referred to here as Business Tier Architecture (BTA), to develop reusable business tier components which enforce access control policies to data residing inside relational databases management systems. Besides BTA, this paper also presents a proof of concept based on Java and on Java Database Connectivity (JDBC).