Role-based access control for loosely coupled distributed database management systems

Download
Author
Hammoudi, Faouzi.
Nygard, Greg L.
Date
2002-03Advisor
Michael, James Bret
Osmundson, John
Metadata
Show full item recordAbstract
Much of the work to date to apply Role-Based Access Control (RBAC) to database management systems has focused on single database systems or an integrated distributed database system. For situations where the need exists to consolidate multiple independent databases, and where the direct integration of the databases is neither practical nor desirable, the application of RBAC requires that policy be enforced via a method that is distinct from the databases. The method must provide for the verification of the RBAC policy, while allowing for the independence of the various databases on which the policy is enforced. This paper proposes a model for an application that provides for a web-based interface for users to be granted access to data held in various independent databases. The application enforces a strict RBAC policy on a well-defined set of accesses, while alleviating the need for users to have a separate account on each of the databases.
Rights
Copyright is reserved by the copyright owner.This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Information security considerations for applications using Apache Accumulo
Pontius, Brandon H. (Monterey, California: Naval Postgraduate School, 2014-09);NoSQL databases are gaining popularity due to their ability to store and process large heterogeneous data sets more efficiently than relational databases. Apache Accumulo is a NoSQL database that introduced a unique ... -
Defense spending databases for countries in the Asia-Pacific Region: an analysis and comparison
Reuning, Charles R. (2001-03);The purpose of this research was to identify and analyze a select number of unclassified databases that cover defense spending and other defense related criteria for countries in the Asia-Pacific region. A thorough search ... -
A multilevel secure constrained intrusion detection system prototype
Ang, Kah Kin. (Monterey, California. Naval Postgraduate School, 2010-12);The Monterey Security Architecture (MYSEA) provides a distributed multilevel secure (MLS) environment consisting of a MLS local area network (LAN) and multiple single-level networks. The MYSEA server enforces a mandatory ...