Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database
Abstract
- Using Security Methods to Enforce Mandatory and Discretionary Access Control in an Object Database
Recommendations
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
Security enhanced Linux to enforce mandatory access control in health information systems
HDKM '08: Proceedings of the second Australasian workshop on Health data and knowledge management - Volume 80This paper introduces Security Enhanced Linux (SELinux) as the required Operating System (OS) to enforce Mandatory Access Control (MAC) mechanisms to protect Health Information. Health Information Systems (HIS) require an OS which can enforce MAC rules ...
Discretionary access control with the administrative role graph model
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologiesPrevious research examining the mapping of discretionary access control (DAC) to role-based access control (RBAC) has considered neither ownership nor further granting of privileges. We show how to accomplish this by mapping from a relational database ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
World Scientific Press
Publication History
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0