CFP last date
20 January 2025
Reseach Article

Review on Database Access Control Mechanisms and Models

by Arpita Yadav, Ritesh Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 120 - Number 18
Year of Publication: 2015
Authors: Arpita Yadav, Ritesh Shah
10.5120/21328-4292

Arpita Yadav, Ritesh Shah . Review on Database Access Control Mechanisms and Models. International Journal of Computer Applications. 120, 18 ( June 2015), 21-24. DOI=10.5120/21328-4292

@article{ 10.5120/21328-4292,
author = { Arpita Yadav, Ritesh Shah },
title = { Review on Database Access Control Mechanisms and Models },
journal = { International Journal of Computer Applications },
issue_date = { June 2015 },
volume = { 120 },
number = { 18 },
month = { June },
year = { 2015 },
issn = { 0975-8887 },
pages = { 21-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume120/number18/21328-4292/ },
doi = { 10.5120/21328-4292 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:06:33.714907+05:30
%A Arpita Yadav
%A Ritesh Shah
%T Review on Database Access Control Mechanisms and Models
%J International Journal of Computer Applications
%@ 0975-8887
%V 120
%N 18
%P 21-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The recent rapid explosion of web based applications and information system have further increased the risk exposure of databases and thus, data protection is today more crucial than ever. It is more important to protect data not only from external intruders but also internal intruders. In this paper, different access control mechanisms and its models discussed to achieving the confidentiality, integrity and availability goals of the database security in the organization. The models are useful in classification systems to prevent theft of information and effect of data at higher classification levels.

References
  1. E. Bertino, D. Leggieri, and E. Terzi, "Securing DBMS: Characterizing and Detecting Query Flood,"Proc. Ninth Information Security Conf. (ISC '04), Sept. 2004.
  2. Bell D E, La Padula L J. Secure computer system: unified exposition and multics interpretation. Mitre Report, MTR-2997 Rev. 1,1976.
  3. Trusted computer system evaluation criteria (Orange Book). Technical Report DoD Standard 5200. 28-STD, U. S. Department of Defense (DoD), December 1985.
  4. Elisa Bertino, Fellow, and Ravi Sandhu,"Database Security Concepts,Approaches, and Challenges", IEEE Transactions on Dependable and secure computing, vol. 2, No. 1, March 2005
  5. "Reliability Extended Security Model Combining Confidentiality and Integrity", Xiaofei Zhang1, Changxiang Shen2 1State Key Lab of Information Security, Chinese Academy of Sciences Graduate School,Beijing 100049, P. R. China
  6. "Configuring Clark-Wilson Integrity Model to Enforce Flexible Protection", Qingui Xu, Dongguan University of technology, International Conference on Computational Intelligence and Security 2009.
  7. D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies". In roceedings of the IEEE Symposium on Security and Privacy, Oakland, April 1987.
  8. Aneta Poniszewska-Maranda, "Representation of Extended RBAC Model Using UML Language". In Springer Berlin Heidelberg on computer science, December 27, 2004
Index Terms

Computer Science
Information Sciences

Keywords

Access Control Mechanism Bell-LaPadula security model Biba security model Clark Wilson model Role Based Access Control model.