Database security
White-hat security arsenal: tackling the threats
White-hat security arsenal: tackling the threats
Protecting Information when Access is Granted for Collaboration
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Information release control: a learning-based architecture
Journal on Data Semantics II
Hi-index | 0.00 |
The database and document worlds have traditionally had different approaches to security. Databases provide access controls on structured data, while document security interrogates the outgoing information, based on document markings and actual contents. For the emerging world in which many documents are generated from structured data (and vice versa), the separation can cause failure, implementation-dependence, inconsistency, and wasted effort. After comparing approaches and mechanisms in the two areas, we identify issues in security administration and implementation in military and medical applications. We then present elements of a unifying model.