Sciweavers

29 search results - page 2 / 6
» Implementing Reflective Access Control in SQL
Sort
View
SIGMOD
2006
ACM
124views Database» more  SIGMOD 2006»
14 years 5 months ago
Redundancy and information leakage in fine-grained access control
The current SQL standard for access control is coarse grained, in that it grants access to all rows of a table or none. Fine-grained access control, which allows control of access...
Govind Kabra, Ravishankar Ramamurthy, S. Sudarshan
DNIS
2010
Springer
240views Database» more  DNIS 2010»
13 years 8 months ago
AccKW: An Efficient Access Control Scheme for Keyword-Based Search over RDBMS
Access control for relational databases is a well researched area. An SQL query is allowed or denied access to database according to the specified access control policy. On the oth...
Vikram Goyal, Ashish Sureka, Sangeeta Lal
SAC
2009
ACM
13 years 11 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
EUROSYS
2007
ACM
14 years 1 months ago
Authorizing applications in singularity
We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
Ted Wobber, Aydan R. Yumerefendi, Martín Ab...
CSREAEEE
2006
117views Business» more  CSREAEEE 2006»
13 years 6 months ago
Open Source Implementation of the NIST Healthcare Standards Landscape
-- The NIST HealthCare Standards Landscape (HCSL) is a project to develop and demonstrate a web-based repository of information (called "Landscape") on healthcare informa...
Hai Tang, Roy Morgan, Thomas Rhodes, Clement Ridor...