The International Journal of Innovative Research in Computer and Communication Engineering
With the development of Internet and Intranet, Web and distributed databases have been used more and more widely. It is important to properly handle network and Web database security issues including authentication, denial of service, and fine-grained access control. When database access control and the network security are addressed separately, the security systems are not optimized sufficiently as a whole. This paper presents a criterion-based role-based access control model in which Secure Permissions (SP), Secure Operations (SOp), Secure Objects (SOb), and Secure Users (SU) are introduced.