Поиск по каталогу |
(строгое соответствие)
|
- Профессиональная
- Научно-популярная
- Художественная
- Публицистика
- Детская
- Искусство
- Хобби, семья, дом
- Спорт
- Путеводители
- Блокноты, тетради, открытки
Data Protection Through Purpose & Role Based Access Control in RDBMS.
В наличии
Местонахождение: Алматы | Состояние экземпляра: новый |
Бумажная
версия
версия
Автор: Suraj Patil
ISBN: 9786139914999
Год издания: 2018
Формат книги: 60×90/16 (145×215 мм)
Количество страниц: 56
Издательство: LAP LAMBERT Academic Publishing
Цена: 23066 тг
Положить в корзину
Позиции в рубрикаторе
Отрасли знаний:Код товара: 211339
Способы доставки в город Алматы * комплектация (срок до отгрузки) не более 2 рабочих дней |
Самовывоз из города Алматы (пункты самовывоза партнёра CDEK) |
Курьерская доставка CDEK из города Москва |
Доставка Почтой России из города Москва |
Аннотация: Privacy is a key requirement in handling personal and sensitive data of individuals. The Database Management System (DBMS) stores such kind of huge data and also provides tools to access and analyze this data. The objective of privacy preservation is to transform original data into some anonymous form to protect personal and sensitive information. There are different access control mechanisms available in database management systems like discretionary access control, mandatory access control, but purpose and role based access control covers major part of privacy and security. The purposes and roles play an important role in privacy preservation. The basic idea behind a purpose and role based model is that, it support policy specification and enforcement module that integrated into relational DBMS. It bridges the gap between privacy and security oriented data protection. It uses query rewriting method for access control and enforcing policy. Role Based Access Control (RBAC) is used to regulate the access to resources based on the roles of individual users within an enterprise. Purpose Based Access Control (PuBAC) regulates the access based on purpose for which data can be accessed.
Ключевые слова: Data Security, Privacy, Access Control, RDBMS