Computer Science ›› 2010, Vol. 37 ›› Issue (7): 160-164.
Previous Articles Next Articles
TU Jin-de,QIN Xiao-lin,DAI Hua
Online:
Published:
Abstract: With the rapid development of information and technology, database faces more serious security situation. As the center of storage and process for the important data, databases often become the targets of attacks. Research of the access control has been an important part in the field of database security, but the traditional access control technologies could not satisfy the requirements of modern database security. On the basis of traditional DAL mechanism research, we proposed a doublcauthorization chain sets based access control modcl(DACS),which supports 8 kinds of authorization management functions including normal authorization and denial authorization, and has denial authorization mechanism and non-cascade revoking mechanism.
Key words: Secure database, Access control, Authorization chain sets
TU Jin-de,QIN Xiao-lin,DAI Hua. Double-authorization Chain Sets Based Access Control Model[J].Computer Science, 2010, 37(7): 160-164.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2010/V37/I7/160
Cited