Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Analysis of Fine-Grained Access Control in Database

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 4
Year of Publication: 2012
Authors:
Vaibhav N. Dhage
R. R. Shelke

Vaibhav N Dhage and R R Shelke. Article: Analysis of Fine-Grained Access Control in Database. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(4):19-21, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Vaibhav N. Dhage and R. R. Shelke},
	title = {Article: Analysis of Fine-Grained Access Control in Database},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {4},
	pages = {19-21},
	month = {May},
	note = {Full text available}
}

Abstract

The access control decision is enforced by a mechanism of security policy. Fine Grained Access Control (FGAC) is one of the ways to ensure data security in database. Nowadays, we store a measurable portion of that data in the relational database management systems (RDBMS). Access control is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table level, and even on individual record (tuple) and data field level. In this paper we described the introduction of Access Control Mechanisms of fine-grained access control in databases which determines whether access to a resource is permitted. We also included the study of Oracle's Virtual Private Database. Different models exist for providing access control at Database level is our proposed work.

References

  • Neha Sehta, Dr. Suresh Jain "A Fine Grained Access Control Model for Relational Databases" IJCSIT, Vol. 3 (1), 2012, 3183 – 3186
  • Stonebraker, M. , Wong, E. , 1974. "Access Control in a relational Database Management System by Query Modification" Proc. ACM Annual Conf. , p. 180-186. [doi:10. 1145/800182. 810400]
  • Surajit Chaudhuri, Tanmoy Dutta, and S. Sudarshan, "Fine Grained Authorization Through Predicated Grants"
  • Qihua Wang¤ Ting Yu,et al, On the Correctness Criteria of FineGrained Access Control in Relational Databases
  • E. Bertino, S. Jajodia, and P. Samarati, "A Flexible Authorization Mechanism for Relational Data Management Systems," in ACM Transactions on Information Systems, April, 1999
  • Nirmal Dagdee, Ruchi Vijaywargiya: "Role based hybrid access control Methodology for shared Electronic Health Records".
  • Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank: "Role-Based Access Control Models", IEEE Computer, Volume 29, Number 2, pages 38-47, 1996
  • Sabrina De Capitanidi Vimercati, Pierangela Samarati: New Directions in Access control, www. spdp. dti. unimi. it/papers/nato. pdf, 2002
  • Pierangela Samarati1 and Sabrina De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms".
  • Utkarsh Jain, Seminar Report "Fine-grained Access Control in Databases"
  • The virtual private database in oracle9ir2: An oracle technical white paper. http://otn. oracle. com/deploy/security/oracle9ir2/pdf/vpd9ir2twp. pdf.