A Survey of Criterion-Based Role to Access Control Model in Secure Permissions

Download Now
Provided by: The International Journal of Innovative Research in Computer and Communication Engineering
Topic: Security
Format: PDF
With the development of Internet and Intranet, Web and distributed databases have been used more and more widely. It is important to properly handle network and Web database security issues including authentication, denial of service, and fine-grained access control. When database access control and the network security are addressed separately, the security systems are not optimized sufficiently as a whole. This paper presents a criterion-based role-based access control model in which Secure Permissions (SP), Secure Operations (SOp), Secure Objects (SOb), and Secure Users (SU) are introduced.
Download Now

Find By Topic