Nested transactions: an approach to reliable distributed computing
Nested transactions: an approach to reliable distributed computing
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
IEEE Transactions on Software Engineering
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
CACL: efficient fine-grained protection for objects
OOPSLA '92 conference proceedings on Object-oriented programming systems, languages, and applications
Design and implementation of a database inference controller
Data & Knowledge Engineering
Database security: research and practice
Information Systems
Role-Based Access Control Models
Computer
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The multilevel relational (MLR) data model
ACM Transactions on Information and System Security (TISSEC)
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
SQL: 1999, formerly known as SQL3
ACM SIGMOD Record
A fast procedure for finding a tracker in a statistical database
ACM Transactions on Database Systems (TODS)
ACM Transactions on Database Systems (TODS)
System R: relational approach to database management
ACM Transactions on Database Systems (TODS)
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Secure statistical databases with random sample queries
ACM Transactions on Database Systems (TODS)
The SIFT information dissemination system
ACM Transactions on Database Systems (TODS)
A lattice model of secure information flow
Communications of the ACM
Using sample size to limit exposure to data mining
Journal of Computer Security - Special issue on database security
Role-based authorization constraints specification
ACM Transactions on Information and System Security (TISSEC)
TRBAC: A temporal role-based access control model
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
A nested transaction model for multilevel secure database management systems
ACM Transactions on Information and System Security (TISSEC)
Network security: PRIVATE communication in a PUBLIC world
Network security: PRIVATE communication in a PUBLIC world
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Active Database Systems: Triggers and Rules for Advanced Database Processing
Active Database Systems: Triggers and Rules for Advanced Database Processing
Transaction Processing: Concepts and Techniques
Transaction Processing: Concepts and Techniques
Database Security and Integrity
Database Security and Integrity
A model of OASIS role-based access control and its support for active security
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Improving Data Quality in Practice: A Case Study in the Italian Public Administration
Distributed and Parallel Databases
Securing XML Documents with Author-X
IEEE Internet Computing
Lattice-Based Access Control Models
Computer
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
Supporting Access Control in an Object-Oriented Database Language
EDBT '92 Proceedings of the 3rd International Conference on Extending Database Technology: Advances in Database Technology
Views and Security in Distributed Database Management Systems
EDBT '88 Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology
Administration Policies in a Multipolicy Autorization System
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Administrative scope: A foundation for role-based administrative models
ACM Transactions on Information and System Security (TISSEC)
Access control with IBM Tivoli access manager
ACM Transactions on Information and System Security (TISSEC)
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
Role-Based Access Control With X.509 Attribute Certificates
IEEE Internet Computing
Achieving k-anonymity privacy protection using generalization and suppression
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Privacy preserving association rule mining in vertically partitioned data
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Lineage tracing for general data warehouse transformations
The VLDB Journal — The International Journal on Very Large Data Bases
Architectures for Intrusion Tolerant Database Systems
ACSAC '02 Proceedings of the 18th Annual Computer Security Applications Conference
Translating Privacy Practices into Privacy Promises—How to Promise What You Can Keep
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Privacy preserving frequent itemset mining
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
Role-Based Access Control
Regulating access to XML documents
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A Role-Based Access Control Model for XML Repositories
WISE '00 Proceedings of the First International Conference on Web Information Systems Engineering (WISE'00)-Volume 1 - Volume 1
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
Succinct specifications of portable document access policies
Proceedings of the ninth ACM symposium on Access control models and technologies
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
Proceedings of the ninth ACM symposium on Access control models and technologies
Administrative scope in the graph-based framework
Proceedings of the ninth ACM symposium on Access control models and technologies
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Extending query rewriting techniques for fine-grained access control
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Selective and Authentic Third-Party Distribution of XML Documents
IEEE Transactions on Knowledge and Data Engineering
IEEE Security and Privacy
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
An authorization model for multimedia digital libraries
International Journal on Digital Libraries
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Scalable security and accounting services for content-based publish/subscribe systems
Proceedings of the 2005 ACM symposium on Applied computing
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Database technologies for electronic commerce
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Towards an internet-scale XML dissemination service
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Systematic control and management of data integrity
Proceedings of the eleventh ACM symposium on Access control models and technologies
Access control enforcement for conversation-based web services
Proceedings of the 15th international conference on World Wide Web
Model driven development of secure XML databases
ACM SIGMOD Record
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
Zerber: r-confidential indexing for distributed documents
EDBT '08 Proceedings of the 11th international conference on Extending database technology: Advances in database technology
Deploying and managing Web services: issues, solutions, and directions
The VLDB Journal — The International Journal on Very Large Data Bases
On replacing cryptographic keys in hierarchical key management systems
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
Incorporating database security courseware into a database security class
Proceedings of the 4th annual conference on Information security curriculum development
Data Dependency Based Recovery Approaches in Survival Database Systems
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part II
High-Assurance Integrity Techniques for Databases
BNCOD '08 Proceedings of the 25th British national conference on Databases: Sharing Data, Information and Knowledge
Engineering Privacy Requirements in Business Intelligence Applications
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
RBAC-based access control for privacy protection in pervasive environments
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
Personal information privacy protection in e-commerce
WSEAS Transactions on Information Science and Applications
Personal information and privacy in E-commerce application
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
A composite privacy protection model
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Hasslefree: simplified access control management for XML documents
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Context RBAC/MAC access control for ubiquitous environment
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
SaaS-model-based approach for mobile government security
International Journal of Mobile Communications
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Privilege states based access control for fine-grained intrusion response
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A privacy policy conflict detection method for multi-owner privacy data protection
Electronic Commerce Research
Expression and enforcement of confidentiality policy in active databases
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Access control to materialized views: an inference-based approach
Proceedings of the 2011 Joint EDBT/ICDT Ph.D. Workshop
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
The "dark side" of information technology: a survey of IT-related complaints from citizens
Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times
Middleware non-repudiation service for the data warehouse
Annales UMCS, Informatica
Controlling access to documents: a formal access control model
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
SecDS: a secure EPC discovery service system in EPCglobal network
Proceedings of the second ACM conference on Data and Application Security and Privacy
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
SecTTS: A secure track & trace system for RFID-enabled supply chains
Computers in Industry
Proceedings of the 13th Annual International Conference on Digital Government Research
Privacy-preserving deletion to generalization-based anonymous database
Proceedings of the CUBE International Information Technology Conference
Performance analysis of decomposition techniques in multilevel secure relational database systems
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
DaWaK'12 Proceedings of the 14th international conference on Data Warehousing and Knowledge Discovery
Probabilistic Inference Channel Detection and Restriction Applied to Patients' Privacy Assurance
International Journal of Information Security and Privacy
Hi-index | 0.00 |
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years the database security community has developed a number of different techniques and approaches to assure data confidentiality, integrity, and availability. However, despite such advances, the database security area faces several new challenges. Factors such as the evolution of security concerns, the "disintermediation驴 of access to data, new computing paradigms and applications, such as grid-based computing and on-demand business, have introduced both new security requirements and new contexts in which to apply and possibly extend current approaches. In this paper, we first survey the most relevant concepts underlying the notion of database security and summarize the most well-known techniques. We focus on access control systems, on which a large body of research has been devoted, and describe the key access control models, namely, the discretionary and mandatory access control models, and the role-based access control (RBAC) model. We also discuss security for advanced data management systems, and cover topics such as access control for XML. We then discuss current challenges for database security and some preliminary approaches that address some of these challenges.