Access control in data management systems:
Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily mad...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[San Rafael, California]
Morgan & Claypool Publishers
[2010]
|
Schriftenreihe: | Synthesis lectures on data management
#4 |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control Intro -- Acknowledgments -- Preface -- Access Control: Basic Concepts -- Introduction -- Historical Prospective -- Data Protection -- Basic Components -- Access Control Policies -- Access Authorizations -- Authorization Subjects -- Authorization Objects -- Authorization Privileges -- Authorizations: Further Components -- Administration Policies -- Access Control Models -- Discretionary Access Control for Relational Data Management Systems -- The Access Matrix Model -- The System R Access Control Model -- GRANT Command -- REVOKE Command -- Authorization Storage -- Authorization Management and Enforcement -- Recursive Revocation -- Authorizations on Views -- DAC Support in SQL -- Extensions to the System R Access Control Model -- Positive and Negative Authorizations -- Temporal Authorizations -- Oracle Virtual Private Database -- Discretionary Access Control for Advanced Data Models -- Access Control for Object DMSs -- Access Control for XML Data -- Access Control Requirements -- Access Control Models -- Efficiency of Access Control -- Mandatory Access Control -- Bell and LaPadula Model -- Multilevel Relational Data Model -- Mandatory Access Control for Object DMSs -- MAC vs DAC -- Information-flow Control Models -- Role-based Access Control -- The ANSI/INCITS RBAC Standard -- Core RBAC -- Hierarchical RBAC -- Constrained RBAC -- RBAC Support in SQL -- Role Administration -- RBAC Extensions -- Emerging Trends in Access Control -- Access Control under the Database as a Service Model -- Access Control for Data Stream Management Systems -- Access Control in the Web 2.0 Era -- OSN Access Control Requirements -- Proposed Solutions -- Further Research Directions in Access Control -- Bibliography -- Author's Biography |
Beschreibung: | 1 Online-Ressource (117 Seiten) |
ISBN: | 9781608453764 |
DOI: | 10.2200/S00281ED1V01Y201005DTM004 |
Internformat
MARC
LEADER | 00000nmm a22000001cb4500 | ||
---|---|---|---|
001 | BV047575110 | ||
003 | DE-604 | ||
005 | 20211125 | ||
007 | cr|uuu---uuuuu | ||
008 | 211105s2010 |||| o||u| ||||||eng d | ||
020 | |a 9781608453764 |c ebook |9 978-1-60845-376-4 | ||
024 | 7 | |a 10.2200/S00281ED1V01Y201005DTM004 |2 doi | |
035 | |a (OCoLC)1284788976 | ||
035 | |a (DE-599)KEP029375843 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Ferrari, Elena |e Verfasser |4 aut | |
245 | 1 | 0 | |a Access control in data management systems |c Elena Ferrari |
264 | 1 | |a [San Rafael, California] |b Morgan & Claypool Publishers |c [2010] | |
264 | 4 | |c © 2010 | |
300 | |a 1 Online-Ressource (117 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Synthesis lectures on data management |v #4 | |
520 | 3 | |a Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control | |
520 | 3 | |a Intro -- Acknowledgments -- Preface -- Access Control: Basic Concepts -- Introduction -- Historical Prospective -- Data Protection -- Basic Components -- Access Control Policies -- Access Authorizations -- Authorization Subjects -- Authorization Objects -- Authorization Privileges -- Authorizations: Further Components -- Administration Policies -- Access Control Models -- Discretionary Access Control for Relational Data Management Systems -- The Access Matrix Model -- The System R Access Control Model -- GRANT Command -- REVOKE Command -- Authorization Storage -- Authorization Management and Enforcement -- Recursive Revocation -- Authorizations on Views -- DAC Support in SQL -- Extensions to the System R Access Control Model -- Positive and Negative Authorizations -- Temporal Authorizations -- Oracle Virtual Private Database -- Discretionary Access Control for Advanced Data Models -- Access Control for Object DMSs -- Access Control for XML Data -- Access Control Requirements -- Access Control Models -- Efficiency of Access Control -- Mandatory Access Control -- Bell and LaPadula Model -- Multilevel Relational Data Model -- Mandatory Access Control for Object DMSs -- MAC vs DAC -- Information-flow Control Models -- Role-based Access Control -- The ANSI/INCITS RBAC Standard -- Core RBAC -- Hierarchical RBAC -- Constrained RBAC -- RBAC Support in SQL -- Role Administration -- RBAC Extensions -- Emerging Trends in Access Control -- Access Control under the Database as a Service Model -- Access Control for Data Stream Management Systems -- Access Control in the Web 2.0 Era -- OSN Access Control Requirements -- Proposed Solutions -- Further Research Directions in Access Control -- Bibliography -- Author's Biography | |
650 | 0 | 7 | |a Datenverwaltung |0 (DE-588)4011168-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenbankverwaltung |0 (DE-588)4389357-0 |2 gnd |9 rswk-swf |
653 | 0 | |a Database management ; Access control.. | |
653 | 0 | |a Data transmission systems ; Access control | |
653 | 0 | |a Electronic books | |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 1 | |a Datenverwaltung |0 (DE-588)4011168-4 |D s |
689 | 0 | 2 | |a Datenbankverwaltung |0 (DE-588)4389357-0 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-60845-375-7 |
830 | 0 | |a Synthesis lectures on data management |v #4 |w (DE-604)BV036731811 |9 4 | |
856 | 4 | 0 | |u https://doi.org/10.2200/S00281ED1V01Y201005DTM004 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-105-MCDM | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032960629 |
Datensatz im Suchindex
_version_ | 1804182924167217152 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Ferrari, Elena |
author_facet | Ferrari, Elena |
author_role | aut |
author_sort | Ferrari, Elena |
author_variant | e f ef |
building | Verbundindex |
bvnumber | BV047575110 |
collection | ZDB-105-MCDM |
ctrlnum | (OCoLC)1284788976 (DE-599)KEP029375843 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.2200/S00281ED1V01Y201005DTM004 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05401nmm a22004931cb4500</leader><controlfield tag="001">BV047575110</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211125 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">211105s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608453764</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-60845-376-4</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.2200/S00281ED1V01Y201005DTM004</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1284788976</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP029375843</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferrari, Elena</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Access control in data management systems</subfield><subfield code="c">Elena Ferrari</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[San Rafael, California]</subfield><subfield code="b">Morgan & Claypool Publishers</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (117 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Synthesis lectures on data management</subfield><subfield code="v">#4</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Intro -- Acknowledgments -- Preface -- Access Control: Basic Concepts -- Introduction -- Historical Prospective -- Data Protection -- Basic Components -- Access Control Policies -- Access Authorizations -- Authorization Subjects -- Authorization Objects -- Authorization Privileges -- Authorizations: Further Components -- Administration Policies -- Access Control Models -- Discretionary Access Control for Relational Data Management Systems -- The Access Matrix Model -- The System R Access Control Model -- GRANT Command -- REVOKE Command -- Authorization Storage -- Authorization Management and Enforcement -- Recursive Revocation -- Authorizations on Views -- DAC Support in SQL -- Extensions to the System R Access Control Model -- Positive and Negative Authorizations -- Temporal Authorizations -- Oracle Virtual Private Database -- Discretionary Access Control for Advanced Data Models -- Access Control for Object DMSs -- Access Control for XML Data -- Access Control Requirements -- Access Control Models -- Efficiency of Access Control -- Mandatory Access Control -- Bell and LaPadula Model -- Multilevel Relational Data Model -- Mandatory Access Control for Object DMSs -- MAC vs DAC -- Information-flow Control Models -- Role-based Access Control -- The ANSI/INCITS RBAC Standard -- Core RBAC -- Hierarchical RBAC -- Constrained RBAC -- RBAC Support in SQL -- Role Administration -- RBAC Extensions -- Emerging Trends in Access Control -- Access Control under the Database as a Service Model -- Access Control for Data Stream Management Systems -- Access Control in the Web 2.0 Era -- OSN Access Control Requirements -- Proposed Solutions -- Further Research Directions in Access Control -- Bibliography -- Author's Biography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbankverwaltung</subfield><subfield code="0">(DE-588)4389357-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Database management ; Access control..</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data transmission systems ; Access control</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic books</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenverwaltung</subfield><subfield code="0">(DE-588)4011168-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenbankverwaltung</subfield><subfield code="0">(DE-588)4389357-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-60845-375-7</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Synthesis lectures on data management</subfield><subfield code="v">#4</subfield><subfield code="w">(DE-604)BV036731811</subfield><subfield code="9">4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.2200/S00281ED1V01Y201005DTM004</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-105-MCDM</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032960629</subfield></datafield></record></collection> |
id | DE-604.BV047575110 |
illustrated | Not Illustrated |
index_date | 2024-07-03T18:31:45Z |
indexdate | 2024-07-10T09:15:16Z |
institution | BVB |
isbn | 9781608453764 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032960629 |
oclc_num | 1284788976 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | 1 Online-Ressource (117 Seiten) |
psigel | ZDB-105-MCDM |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Morgan & Claypool Publishers |
record_format | marc |
series | Synthesis lectures on data management |
series2 | Synthesis lectures on data management |
spelling | Ferrari, Elena Verfasser aut Access control in data management systems Elena Ferrari [San Rafael, California] Morgan & Claypool Publishers [2010] © 2010 1 Online-Ressource (117 Seiten) txt rdacontent c rdamedia cr rdacarrier Synthesis lectures on data management #4 Access control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control Intro -- Acknowledgments -- Preface -- Access Control: Basic Concepts -- Introduction -- Historical Prospective -- Data Protection -- Basic Components -- Access Control Policies -- Access Authorizations -- Authorization Subjects -- Authorization Objects -- Authorization Privileges -- Authorizations: Further Components -- Administration Policies -- Access Control Models -- Discretionary Access Control for Relational Data Management Systems -- The Access Matrix Model -- The System R Access Control Model -- GRANT Command -- REVOKE Command -- Authorization Storage -- Authorization Management and Enforcement -- Recursive Revocation -- Authorizations on Views -- DAC Support in SQL -- Extensions to the System R Access Control Model -- Positive and Negative Authorizations -- Temporal Authorizations -- Oracle Virtual Private Database -- Discretionary Access Control for Advanced Data Models -- Access Control for Object DMSs -- Access Control for XML Data -- Access Control Requirements -- Access Control Models -- Efficiency of Access Control -- Mandatory Access Control -- Bell and LaPadula Model -- Multilevel Relational Data Model -- Mandatory Access Control for Object DMSs -- MAC vs DAC -- Information-flow Control Models -- Role-based Access Control -- The ANSI/INCITS RBAC Standard -- Core RBAC -- Hierarchical RBAC -- Constrained RBAC -- RBAC Support in SQL -- Role Administration -- RBAC Extensions -- Emerging Trends in Access Control -- Access Control under the Database as a Service Model -- Access Control for Data Stream Management Systems -- Access Control in the Web 2.0 Era -- OSN Access Control Requirements -- Proposed Solutions -- Further Research Directions in Access Control -- Bibliography -- Author's Biography Datenverwaltung (DE-588)4011168-4 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf Datenbankverwaltung (DE-588)4389357-0 gnd rswk-swf Database management ; Access control.. Data transmission systems ; Access control Electronic books Zugriffskontrolle (DE-588)4293034-0 s Datenverwaltung (DE-588)4011168-4 s Datenbankverwaltung (DE-588)4389357-0 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-60845-375-7 Synthesis lectures on data management #4 (DE-604)BV036731811 4 https://doi.org/10.2200/S00281ED1V01Y201005DTM004 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Ferrari, Elena Access control in data management systems Synthesis lectures on data management Datenverwaltung (DE-588)4011168-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datenbankverwaltung (DE-588)4389357-0 gnd |
subject_GND | (DE-588)4011168-4 (DE-588)4293034-0 (DE-588)4389357-0 |
title | Access control in data management systems |
title_auth | Access control in data management systems |
title_exact_search | Access control in data management systems |
title_exact_search_txtP | Access control in data management systems |
title_full | Access control in data management systems Elena Ferrari |
title_fullStr | Access control in data management systems Elena Ferrari |
title_full_unstemmed | Access control in data management systems Elena Ferrari |
title_short | Access control in data management systems |
title_sort | access control in data management systems |
topic | Datenverwaltung (DE-588)4011168-4 gnd Zugriffskontrolle (DE-588)4293034-0 gnd Datenbankverwaltung (DE-588)4389357-0 gnd |
topic_facet | Datenverwaltung Zugriffskontrolle Datenbankverwaltung |
url | https://doi.org/10.2200/S00281ED1V01Y201005DTM004 |
volume_link | (DE-604)BV036731811 |
work_keys_str_mv | AT ferrarielena accesscontrolindatamanagementsystems |