作者
Elisa Bertino, Ravi Sandhu
发表日期
2005/4/11
来源
IEEE Transactions on Dependable and secure computing
卷号
2
期号
1
页码范围
2-19
出版商
IEEE
简介
As organizations increase their reliance on, possibly distributed, information systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. Though a number of techniques, such as encryption and electronic signatures, are currently available to protect data when transmitted across sites, a truly comprehensive approach for data protection must also include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics, and other relevant contextual information, such as time. It is well understood today that the semantics of data must be taken into account in order to specify effective access control policies. Also, techniques for data integrity and availability specifically tailored to database systems must be adopted. In this respect, over the years, the database security community has developed a …
引用总数
20052006200720082009201020112012201320142015201620172018201920202021202220232024519413727543948605458352929243129222314
学术搜索中的文章
E Bertino, R Sandhu - IEEE Transactions on Dependable and secure …, 2005