Skip to main content
Article thumbnail
Location of Repository

Protecting federated databases using a practical implementation of a formal RBAC policy \ud

By Steve Barker and Paul Douglas


This paper describes the use of formally specified RBAC\ud policies for protecting federated relational database systems that are accessed over a wide area network. The\ud method that is described combines a formally specified\ud RBAC policy with both temporal and locational constraints.\ud It does not depend on any security mechanism supported by\ud a specific DBMS and is thus portable across platforms.\u

Topics: UOW3
Publisher: IEEE Computer Society
OAI identifier:
Provided by: WestminsterResearch

Suggested articles


  1. (2002). A system to specify and manage multipolicy access control models.
  2. (2000). An Introduction to Database Systems.
  3. (2000). Data protection by logic programming.
  4. (1995). Database Security.
  5. (2003). Flexible access control policy specification with constraint logic programming.
  6. (2001). Flexible security policies in sql.
  7. (2001). Flexible support for multiple access control policies.
  8. (1987). Foundations of Logic Programming.
  9. (2002). Implementing rbac policies in pl/sql.
  10. (2003). Practical rbac policy implementation for sql databases.
  11. (1998). Role-based access control features in commercial database management systems.
  12. (2001). Secure deductive databases.
  13. (1999). The apache jakarta project,
  14. (2000). The nist model for role-based access control: Towards a unified standard.
  15. (2002). The world wide web security faq,
  16. (1994). Xsb as an efficient deductive database engine.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.