|
Prikladnaya Diskretnaya Matematika, 2013, Number 1(19), Pages 50–68
(Mi pdm401)
|
|
|
|
This article is cited in 2 scientific papers (total in 2 papers)
Mathematical Foundations of Computer Security
Transformation rules for states in the DBMS DP-model
V. Y. Smolyaninov
Abstract:
In this article, the DBMS DP-model of access control is introduced for relational database management systems (abbreviated DBMS). For taking into account an access control features in a databases, the model includes procedures, triggers, access rights specific for databases, access rights inheritance and context dynamic change when activating procedures and triggers. The claim about granting access rights to the procedures and containers is proved.
Keywords:
computer security, DBMS DP-model, database management system.
Citation:
V. Y. Smolyaninov, “Transformation rules for states in the DBMS DP-model”, Prikl. Diskr. Mat., 2013, no. 1(19), 50–68
Linking options:
https://www.mathnet.ru/eng/pdm401 https://www.mathnet.ru/eng/pdm/y2013/i1/p50
|
Statistics & downloads: |
Abstract page: | 365 | Full-text PDF : | 94 | References: | 52 | First page: | 1 |
|