Research on the Implementation Methods of Security Management of Distributed Database Application System

Article Preview

Abstract:

A method for implementing privileged management in security management based on role base access control model (RBAC2) is proposed. The idea is creating the users security information space and the security information space for the data base management system separately. The rule and method are given for implementing the mapping from the former onto the latter. The structure of the system for implementing the security management system in the client/server environment is also presented. The adoptability, easy usability and maintainability are primary characters of the method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3000-3003

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Sandhu R S, Cogne E J, Feinstein H L, et al. Role based access control models. IEEE Computer, 2005, 29(2): 38-47.

Google Scholar

[2] Oracle Corporation. Oracle 7 server application developercs guide. California: American Oracle Corporation, (2008).

Google Scholar

[3] D. S. Alexander, W. A. Arbaugh, A. D. Keromytis, and J. M. Smith. Security in active networks. In Jan Vitek and Christian Jensen, editors, Secure Internet Programming, Lecture Notes in Computer Science. Springer-Verlag Inc., New York, NY, USA, (2009).

DOI: 10.1007/3-540-48749-2_20

Google Scholar

[4] M. Blaze, J. Feigenbaum, P. Resnick, and M. Strauss. Managing Trust in an Information Labeling System. In European Transactions on Telecommunications, 8, pages 491-501, (2007).

DOI: 10.1002/ett.4460080507

Google Scholar

[5] M. Calderon, M. Sedano, A. Azcorra, and C. Alonso. The Support of Active Networks for Fuzzy-Tolerant Multicast Applications. IEEE Network Magazine, special issue on Active and Programmable Networks, 12(3): 20-28, (2008).

DOI: 10.1109/65.690961

Google Scholar