{"title":"基于标准的多级数据库安全访问控制","authors":"Leon Pan","doi":"10.1109/ISECS.2008.198","DOIUrl":null,"url":null,"abstract":"This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.","PeriodicalId":144075,"journal":{"name":"2008 International Symposium on Electronic Commerce and Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Using Criterion-Based Access Control for Multilevel Database Security\",\"authors\":\"Leon Pan\",\"doi\":\"10.1109/ISECS.2008.198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.\",\"PeriodicalId\":144075,\"journal\":{\"name\":\"2008 International Symposium on Electronic Commerce and Security\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Symposium on Electronic Commerce and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISECS.2008.198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Electronic Commerce and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISECS.2008.198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using Criterion-Based Access Control for Multilevel Database Security
This paper presents a novel criterion-based access control approach to deal with multilevel database security. In this approach, authorization rules are transformed to security criteria, security criterion expressions, and security criterion subsets. Security criterion expressions are associated with (sub) objects to serve as locks, and security criteria are associated with users to serve as keys. The fine-grained multilevel access control is achieved by using the available security criteria (keys) to evaluate the security criterion expressions (locks). Whether an (sub) object such as a cell, a row, a column, or a table is accessible to a user depends on the evaluation values of the relevant security criterion expressions.