Computer Science ›› 2010, Vol. 37 ›› Issue (7): 160-164.

Previous Articles     Next Articles

Double-authorization Chain Sets Based Access Control Model

TU Jin-de,QIN Xiao-lin,DAI Hua   

  • Online:2018-12-01 Published:2018-12-01

Abstract: With the rapid development of information and technology, database faces more serious security situation. As the center of storage and process for the important data, databases often become the targets of attacks. Research of the access control has been an important part in the field of database security, but the traditional access control technologies could not satisfy the requirements of modern database security. On the basis of traditional DAL mechanism research, we proposed a doublcauthorization chain sets based access control modcl(DACS),which supports 8 kinds of authorization management functions including normal authorization and denial authorization, and has denial authorization mechanism and non-cascade revoking mechanism.

Key words: Secure database, Access control, Authorization chain sets

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!