Computer Science ›› 2005, Vol. 32 ›› Issue (12): 83-87.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: There is limitation on the traditional user identification and access control of database security mechanism, such as to the illegal actions of SOL injection, disassembly with error messages, misusing authorization. The paper presents an access control mo

Key words: Access control, Template, Database security, Security model

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!