Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

An analysis on Fine-grained Access Control in Databases

Print
PDF
IJCA Proceedings on National Conference on Recent Trends in Computing
© 2012 by IJCA Journal
NCRTC - Number 6
Year of Publication: 2012
Authors:
Prasanna M. Rathod
Vrundan R. Parode
R. R. Keole

Prasanna M Rathod, Vrundan R Parode and R R Keole. Article: An analysis on Fine-grained Access Control in Databases. IJCA Proceedings on National Conference on Recent Trends in Computing NCRTC(6):10-14, May 2012. Full text available. BibTeX

@article{key:article,
	author = {Prasanna M. Rathod and Vrundan R. Parode and R. R. Keole},
	title = {Article: An analysis on Fine-grained Access Control in Databases},
	journal = {IJCA Proceedings on National Conference on Recent Trends in Computing},
	year = {2012},
	volume = {NCRTC},
	number = {6},
	pages = {10-14},
	month = {May},
	note = {Full text available}
}

Abstract

Today, there are countless terabytes of data processed by IT systems, and we store a measurable portion of that data in the relational database management systems (RDBMS). Access control in these IT systems, is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table level, and even on individual record (tuple) and data field level. In this report, I survey various models and mechanisms of fine-grained access control in databases. Different models exist for providing access control at level finer than tables. This paper considers existing and upcoming theoretical models as well as models currently implemented in various database systems.

References

  • The virtual private database in oracle9ir2: An oracle technical white paper. http://otn. oracle. com/deploy/security/oracle9ir2/pdf/vpd9ir2twp. pdf.
  • Santosh Dwivedi, Bernard Menezes, and Ashish Singh. Database access control for e-business a case study. In 11th International Conference on Management of Data COMAD (to be presented), 2005.