Notification:
We are currently experiencing intermittent issues impacting performance. We apologize for the inconvenience.
By Topic

Detection of access control flaws in a distributed database system with local site autonomy

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Temtanapat, Y. ; Dept. of Comput. Sci., Rensselaer Polytech. Inst., Troy, NY, USA ; Spooner, David L.

We address the authorization of access privileges to users in a local database management system (DBMS) that is interoperating in a distributed database system (DDBMS). Our focus is on the potential in a next generation security system for delegation access concepts such as role hierarchy delegation to violate the security policy in a local database system that is part of the distributed system. This kind of violation can be categorized as a violation of local autonomy. We propose a labeled graph model to detect such a problem

Published in:

Database Engineering and Applications Symposium, 1997. IDEAS '97. Proceedings., International

Date of Conference:

25-27 Aug 1997