CFP last date
22 April 2024
Reseach Article

An analysis on Fine-grained Access Control in Databases

Published on May 2012 by Prasanna M. Rathod, Vrundan R. Parode, R. R. Keole
National Conference on Recent Trends in Computing
Foundation of Computer Science USA
NCRTC - Number 6
May 2012
Authors: Prasanna M. Rathod, Vrundan R. Parode, R. R. Keole
4da2d0ac-0ca4-429a-9b15-b59dac146bc5

Prasanna M. Rathod, Vrundan R. Parode, R. R. Keole . An analysis on Fine-grained Access Control in Databases. National Conference on Recent Trends in Computing. NCRTC, 6 (May 2012), 10-14.

@article{
author = { Prasanna M. Rathod, Vrundan R. Parode, R. R. Keole },
title = { An analysis on Fine-grained Access Control in Databases },
journal = { National Conference on Recent Trends in Computing },
issue_date = { May 2012 },
volume = { NCRTC },
number = { 6 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 10-14 },
numpages = 5,
url = { /proceedings/ncrtc/number6/6554-1044/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computing
%A Prasanna M. Rathod
%A Vrundan R. Parode
%A R. R. Keole
%T An analysis on Fine-grained Access Control in Databases
%J National Conference on Recent Trends in Computing
%@ 0975-8887
%V NCRTC
%N 6
%P 10-14
%D 2012
%I International Journal of Computer Applications
Abstract

Today, there are countless terabytes of data processed by IT systems, and we store a measurable portion of that data in the relational database management systems (RDBMS). Access control in these IT systems, is one of the cornerstones of any Information Security Policy. The granularity of such access control can be on different levels, like on directories or folder level, database level, table level, and even on individual record (tuple) and data field level. In this report, I survey various models and mechanisms of fine-grained access control in databases. Different models exist for providing access control at level finer than tables. This paper considers existing and upcoming theoretical models as well as models currently implemented in various database systems.

References
  1. The virtual private database in oracle9ir2: An oracle technical white paper. http://otn. oracle. com/deploy/security/oracle9ir2/pdf/vpd9ir2twp. pdf.
  2. Santosh Dwivedi, Bernard Menezes, and Ashish Singh. Database access control for e-business a case study. In 11th International Conference on Management of Data COMAD (to be presented), 2005.
Index Terms

Computer Science
Information Sciences

Keywords

Rdbms It System Fine-grain Access Tuple