Controlling Database Access by Providing Access Permissions on Database Objects
|
|
|
- Alison Greer
- 9 years ago
- Views:
Transcription
1 International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April Controlling Database Access by Providing Access Permissions on Database Objects 1 Manushi Majumdar, 2 Anu Unni, 3 Hrishikesh Babar, 4 Abhishek Birjepatil, 5 Prof. Anand Magar Sinhgad Academy of Engineering, (University of Pune), Kondhwa-Bk, Pune Abstract The paer focuses on securing a table in the database, to the row level, implying that not all the rows in a database can be accessed by the end user. A user can access and perform operations on only those rows which he has been assigned right to access. Traditionally, there are various ways and techniques to achieve this. The approach adopted by us is analogous to the NTFS security and Permission model, where every row in the database table corresponds to an NTfs object, i.e a folder or file. Permissions controlling access are applied to every database object. Moreover, a hierarchial structure of the objects can be enabled using the Role Based Access Policy (RBAC). Using RBAC principles, multiple hierarchy could also be supported, where in an object could act as a parent object to another object, thus implementing inheritance of permissions from parent to child object. The resultant permission obtained on the child object could be calculated and resultantly enforced when a user wants to access it. Index Terms NTFS, Permission, RBAC, Access Control, Database, Hierarchy, Database Object 1 INTRODUCTION In this era of Information, a very huge amount of information is stored in the form of a database. For instance, in a business environment, databases are maintained to store client details, financial information, human resource details, i.e. all the data that keeps your company in business. Hence it is extremely important to secure the data in the database to make sure that the data is not accessed by people unauthorized to do so. Also, the database needs to be secured even at the row-level of a table, so as to prevent all the data contained in the table to be accessed by even those unauthorized for the same. An example of a table storing the employee details of an organization could be considered for the above case. Not every employee must be allowed to see the details of a particular employee. To achieve this, access to the database has to be controlled on an extremely granular level. The New Technology File System(NTFS), incorporated by the Microsoft Corporation for it's Windows Operating Systems was meant to replace their initial File System FAT[1]. NTFS has many advantages over FAT, including reliability, increased storage capacity and efficiency. Details of Authors: 1,2,3,4 are Students of B.E (Information Technology) at Sinhgad Academy of Engineering. 5 is a professor at the Information Technology Department of Sinhgad Academy of Engineering, and is the faculty guide of the afro mentioned students who have performed the research. -id: [email protected], [email protected], [email protected], [email protected], [email protected] But a striking feature of NTFS is its security, i.e. NTFS offers a secure environment and flexible control over what can be accessed by which users, to allow for many different users and groups of users to be networked together, with each able to access only the appropriate data.[2] Our paper aims to follow the NTFS security and permission model to adopt their security principles at the database level, so as provide for controlled access. Also the Role Based Access Control technique is extended on the database model, to limit access to users based on the roles they have and the permissions and access rights granted to the roles. 2 LITERATURE SURVEY 2.1 NTFS Security in NTFS s oriented around the key concept of assigning rights to specific users or groups of users. As per requirement, a number of user accounts are created, each comprising of a user or a group of users. The user accounts are classified based on some common credentials held by the users, and the access rights that the respective account has on the files and folders present. A set of predefined permissions are enabled on the contained files and folders based on the respective accounts. Access control lists (ACLs) are used to manage which users and groups of users are allowed to access different files and folders (objects) within NTFS volumes.
2 International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April These ACLs contains entries that specify what rights each user or group has for the object in question. These access rights are called permissions. The six basic permissions created for NTFS objects are READ(R), WRITE(W), EXECUTE(X), DELETE(D), TAKE OWNERSHIP(O), CHANGE PERMISSIONS(P). Additionally one can even apply a FULL CONTROL to a group where the group is granted all the permissions and complete access. NTFS permissions can be "granted" or "denied". Another feature of NTFS security is inheritance of permissions, where the child file or folder inherits the permissions applied on it's parent folder or other folders up the hierarchy. But for any file or folder, the explicitly applied permissions have higher precedence over the inherited permissions. Similarly, permissions denied have a higher precedence over permissions granted. The following Rules apply in the process of permission resolution: 1. "Deny" permissions take precedence over "allow" permissions. 2. Permissions applied directly to an object take precedence over permissions inherited from a parent object. 3. Permissions inherited from near relatives take precedence over permissions inherited from distant predecessors. So permissions inherited from the object's parent folder take precedence over permissions inherited from the object's "grandparent" folder, and so on. 4. Permissions from different user groups that are at the same level (in terms of being directly-set or inherited, and in terms of being "deny" or "allow") are cumulative. So if a user is a member of two groups, one of which has an "allow" permission of "Read" and the other has an "allow" of "Write", the user will have both read and write permission--depending on the other rules above, of course) Hence the hierarchy followed by the permissions is as follows: Explicit Deny -> Explicit Allow -> Inherited Deny -> Inherited Allow [3] Fig. NTFS Permission Enforcement 2.2RBAC Role-based access control (RBAC) is a method of regulating access to computer or network resources based on the roles of individual users within an enterprise. In this context, access is the ability of an individual user to perform a specific task, such as view, create, or modify a file. Roles are defined according to job competency, authority, and responsibility within the enterprise. RBAC is a specialized permission model that applies permissions on the predefined roles, and roles are assigned to one or more users. It is a technique that brings the set of users on one side and the set of permissions on the other.[4] Thus, in order to access an object, a user needs to hold a particular role that contains permissions to access the object. The four components of the RBAC system are as follows: A. CORE RBAC It embodies the essential aspects of RBAC. The basic concept of RBAC is that users are assigned to roles, and users acquire permissions by being members of roles. Core RBAC includes requirements that user-role and permission-role assignment can be many-to-many. It includes requirements for user-role review whereby the roles assigned to a specific user can be determined as well as users assigned to specific role. A similar requirement for permission-role review is imposed as an advanced review feature. It allows includes the concept of user sessions, which allows selective activation and deactivation of roles. Finally it requires that users be able to simultaneously exercise permission of multiple roles. This
3 International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April precludes products that restrict users of activation of one role at a time.[5] B. HIERARCHICAL RBAC It adds requirements for supporting role hierarchies. A hierarchy is mathematically a partial order defining a seniority relation between roles, whereby the seniors roles acquire the permission of their juniors, and junior roles acquire the user membership of their seniors. This standard recognizes two types of role hierarchies 1.General Hierarchical RBAC: In this case, there is support for an arbitrary partial order to serve as role hierarchy, to include the concept of multiple inheritance of permissions and user membership among roles. 2.Limited Hierarchical RBAC: Some systems may impose restrictions on the role hierarchy. Most commonly, hierarchies are limited to simple structures such as trees and inverted trees[5] roles are considered when enforcing the constraints. 2. Dynamic Separation of Duty Relations: Dynamic separation of duty (DSD) relations, like SSD relations, limit the permissions that are available to a user. However DSD relations differ from SSD relations by the context in which these limitations are imposed. DSD requirements limit the availability of the permissions by placing constraints on the roles that can be activated within or across a user s sessions. DSoD policies deter fraud by placing constrains on the roles that can be activated in any given session there by restricting combinations of privileges that are available to users.[4] C.SEPARATION OF DUTY RELATIONS Separation of duty relations are used to enforce conflict of interest policies. Conflict of interest in a role-based system may arise as a result of a user gaining authorization for permissions associated with conflicting roles. One means of preventing this form of conflict of interest is though static separation of duty (SSD), that is, to enforce constraints on the assignment of users to roles. The SSD policy can be centrally specified and then uniformly imposed on specific roles. Because of the potential for inconsistencies with respect to static separation of duty relations and inheritance relations of a role hierarchy, we define SSD requirements both in the presence and absence of role hierarchies. SoD policies deter fraud by placing constrains on administrative actions and there by restricting combinations of privileges that are available to users 1.Static Separation of Duty Relations: Static Separation of Duty. SSD relations place constraints on the assignments of users to roles. Membership in one role may prevent the user from being a member of one or more other roles, depending on the SSD rules enforced. Static Separation of Duty in the Presence of a Hierarchy. This type of SSD relation works in the same way as basic SSD except that both inherited roles as well as directly assigned Fig. RBAC Components[6] 3 PROPOSED WORK All the necessary objects that require controlled access must be stored in the database. RBAC can be implemented by maintaining a hierarchy of those database objects, i.e organizing them in a parent-child structure. This is analogous to NTFS where, a particular folder could have multiple parent folders in a hierarchy as well as multiple file/folders as children in hierarchy. The parent and child of every object, if any, could be maintained in another table that holds the inheritance details. This table could reference the original table that stores all the necessary objects, with the help of its primary key. Thus, for every tuple, the hierarchy table would store the primary key of the objects acting as parent and child. Multiple inheritance, could also be taken care of by this table structure where the child object of a particular parent-child pair, could act as a parent object of another parent-child pair, thus implying the presence of Limited Hierarchy or General Hierarchy RBAC. Also, as in the NTFS model, a particular file system object could belong to multiple
4 International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April groups, similarly one database object could have multiple parent objects that it is associated to. Hence, as per the demand of the system to be implemented, Static or Dynamic Separation of Duties could be carried out to control access for a session or permanently. Taking this further, permissions can also be set on the database objects, which further limit the access one will have on the database object, as well as the tasks one is authorized to perform on them. If we consider the example of the basic permissions provided by NTFS, and prepare a structure as follows: Position Permission 1 Read 2 Write 3 Execute 4 Delete Table 1: HierarchyTable In the above table structure, position is a primary key numeric value indicating the position that the particular Permission has in the PermissionNameTbl. A permission string could be associated with every object in the database. For instance, an Obejct A is assigned permissions Read and Delete, then the resultant permission string for Object A will be "1001" where 1 = permission at the respective position is "assigned" 0 = permission at the respective position is "not assigned" Additionally, stored procedures could be written to eforce the permissions on the database objects. Whenever the user of the system wishes to access a particular object, a permission check procedure should be called that will evaluate the permissions available on the object by the particular user and thus grant or deny the access request made. This system would also successfully implement RBAC as effective permissions available on an object could vary based on the role held by the particular user/object accessing the object to be accessed. The role of the accessing object will determine the permissions owned by it over the accessed object, which can vary from session to session. Thus the effective permissions over the accesed object will be calculated, thereby restricting access to database objects. Thus we have seen how the NTFS permission principles can be extended on the database. This approach not only has benefits of access control that we are looking to achieve, but also provides the additional benefit of grouping of users that can simplify delegation of tasks. Additionally, RBAC has its own benefits when the database has to be created for an enterprise or for a scenario where users distinguished based on their roles.in a scenario like this, distinguishing people based on identity proves to be expensive as well as inconvenient. RBAC provides for security based on the roles one has, naturally introducing a hierarchy on the system designed. Moreover, introducing permissions that a user has on an object, helps regulate access checks down to the database level. 5 REFERENCES [1] [2] [3] MCSE Self-Paced Training Kit: Microsoft Windows 2000 Core Requirements, Exams , , , , 2nd Edition [4] Role Based Accesss Control, Second Edition by David F. Ferrialo, D. Richard Kuhn, Ramaswamy Chandramouli [5]Role Based Access Control Models by Dr.Saeed Rajput and Reena Cherukuri. [6] com/jts/fortress/accessmgr.html 4 CONCLUSION
5 International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
Combining Shared Folder and NTFS Permissions
Combining Shared Folder and When you combine NTFS permissions and share permissions the most restrictive effective permission applies. For example, if you share a folder and assign the share permission
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Lesson 14: Configuring File and Folder Access. MOAC 70-687: Configuring Windows 8.1
Lesson 14: Configuring File and Folder Access MOAC 70-687: Configuring Windows 8.1 Overview Exam Objective 4.2: Configure file and folder access o Encrypt files and folders by using Encrypting File System
Objectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
FOR SYSTEM ADMINISTRATORS AND USERS. August 2012 Version 2
FOR SYSTEM ADMINISTRATORS AND USERS August 2012 Version 2 TABLE OF CONTENTS SECTION 1: BEST PRACTICES FOR SYSADMINS... 1 Best Practices Recommendations... 1 Permissions... 1 Security... 2 Miscellaneous...
Approvals Management Engine R12 (AME) Demystified
Approvals Management Engine R12 (AME) Demystified By Sujay Kamath Prisio Technologies Introduction In today s world, many organizations are in need of implementing proper controls in place for faster transaction
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project. Presented to the faculty of the Department of Computer Science
OBJECT-RELATIONAL DATABASE APPROACH FOR ROLE-BASED ACCESS CONTROL (RBAC) A Project Presented to the faculty of the Department of Computer Science California State University, Sacramento Submitted in partial
A Conceptual Overview for CMS Administrators, Architects, and Developers
Sitecore CMS 6 version 0.5 Security Reference Rev. 080627 Sitecore CMS 6 Security Reference A Conceptual Overview for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction...
SHARING FILE SYSTEM RESOURCES
1 Chapter 9 SHARING FILE SYSTEM RESOURCES Chapter 9: SHARING FILE SYSTEM RESOURCES 2 CHAPTER OVERVIEW Create and manage file system shares and work with share permissions Use NTFS file system permissions
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
On XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Denodo Data Virtualization Security Architecture & Protocols
Denodo Data Virtualization Security Architecture & Protocols XLS Security Architecture & Protocols We include hereinafter a description of the security support in the Denodo Platform. The following diagram
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
Master Data Services Environment
Master Data Services Training Guide Master Data Services Environment Portions developed by Profisee Group, Inc. 2010 Microsoft Master Data Services Overview Master Data Services Implementation Master Data
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
Chapter. Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER:
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
IBM Cognos BI CAM Authentication Limitation with Cognos TM1 Data
IBM Cognos BI CAM Authentication Limitation with Cognos TM1 Data IBM Cognos BI CAM Authentication Limitation with Cognos TM1 Data Introduction... 3 Who should read this bulletin... 3 Products affected...
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology
Managing an Active Directory Infrastructure O BJECTIVES
O BJECTIVES This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure and Managing and Maintaining an Active Directory Infrastructure
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Student Outcomes. Lesson Notes. Classwork. Discussion (10 minutes)
NYS COMMON CORE MATHEMATICS CURRICULUM Lesson 5 8 Student Outcomes Students know the definition of a number raised to a negative exponent. Students simplify and write equivalent expressions that contain
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Object Oriented Databases. OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar
Object Oriented Databases OOAD Fall 2012 Arjun Gopalakrishna Bhavya Udayashankar Executive Summary The presentation on Object Oriented Databases gives a basic introduction to the concepts governing OODBs
A COMBINED FINE-GRAINED AND ROLE-BASED ACCESS CONTROL MECHANISM HONGI CHANDRA TJAN. Bachelor of Science. Oklahoma State University
A COMBINED FINE-GRAINED AND ROLE-BASED ACCESS CONTROL MECHANISM By HONGI CHANDRA TJAN Bachelor of Science Oklahoma State University Stillwater, Oklahoma 200 Submitted to the faculty of the Graduate College
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
EPM Performance Suite Profitability Administration & Security Guide
BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects
The CRUD Security Matrix: A Technique for Documenting Access Rights
The CRUD Security Matrix: A Technique for Documenting Access Rights Dale L. Lunsford, Michael R. Collins Phillips School of Business High Point University Abstract The CRUD matrix is an excellent technique
CliQr CloudCenter. Multi-Tenancy
CliQr CloudCenter Multi-Tenancy CliQr CloudCenter Multi-Tenancy and Multi-User Model Page 2 Table of Contents 1 Executive Summary...2 2 Introduction...3 3 Use Case: Application Onboarding...4 4 Use Case:
SPL: An access control language for security policies with complex constraints
SPL: An access control language for security policies with complex constraints Carlos Ribeiro, André Zúquete, Paulo Ferreira and Paulo Guedes IST / INESC Portugal E-mail: Carlos.Ribeiro,Andre.Zuquete,Paulo.Ferreira,Paulo.Guedes
Cello How-To Guide. Tenant Hierarchy Management
Cello How-To Guide Tenant Hierarchy Management Contents 1 Introduction to Tenant Hierarchy... 3 1.1 Tenant Type... 3 1.2 How to Enable Reseller... 4 1.3 Tenant Activation/Deactivation... 6 1.4 Tenant Impersonation...
Advanced Features for Enterprise-Wide Role-Based Access Control
Advanced Features for Enterprise-Wide -Based Access Control Axel Kern Systor Security Solutions GmbH Hermann-Heinrich-Gossen-Str. 3 50858 Köln, Germany [email protected] Abstract The administration
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
HP ALM Best Practices Series
HP ALM Best Practices Series For ALM Practitioners Business Process Models Best Practices Document Release Date: June 2015 Legal Notices Warranty The only warranties for HP products and services are set
Product Mix as a Framing Exercise: The Role of Cost Allocation. Anil Arya The Ohio State University. Jonathan Glover Carnegie Mellon University
Product Mix as a Framing Exercise: The Role of Cost Allocation Anil Arya The Ohio State University Jonathan Glover Carnegie Mellon University Richard Young The Ohio State University December 1999 Product
Architecture and Functions of Database Management System for Tracking and Management of Tools
БЪЛГАРСКА АКАДЕМИЯ НА НАУКИТЕ. BULGARIAN ACADEMY OF SCIENCES КИБЕРНЕТИКА И ИНФОРМАЦИОННИ ТЕХНОЛОГИИ Том 4, 1 CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 4, No 1 София. 2004. Sofia Architecture and
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen Jason Crampton Information Security Group, Royal Holloway, University of London 7th International Workshop on Security and Trust Management Risk-Aware RBAC
A. TRUE-FALSE: GROUP 2 PRACTICE EXAMPLES FOR THE REVIEW QUIZ:
GROUP 2 PRACTICE EXAMPLES FOR THE REVIEW QUIZ: Review Quiz will contain very similar question as below. Some questions may even be repeated. The order of the questions are random and are not in order of
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Oracle BI EE 11g - Security Auditing
Oracle BI EE 11g - Security Auditing Venkatakrishnan J Agenda Overview of BI EE Security Authentication Authorization Security Endpoints Overview Weblogic & EM BI Server Presentation Server - How is Web
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark. For Windows Server 2008 (Domain Member Servers and Domain Controllers)
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 (Domain Member Servers and Domain Controllers) Symantec Enterprise Security Manager Baseline Policy
Administering Group Policy with Group Policy Management Console
Administering Group Policy with Group Policy Management Console By Jim Lundy Microsoft Corporation Published: April 2003 Abstract In conjunction with Windows Server 2003, Microsoft has released a new Group
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Managing an Active Directory Infrastructure
3 CHAPTER 3 Managing an Active Directory Infrastructure Objectives This chapter covers the following Microsoft-specified objectives for the Planning and Implementing an Active Directory Infrastructure
Design and Implementation of Access Control as a Service for IaaS Cloud
Design and Implementation of Access Control as a Service for IaaS Cloud Ruoyu Wu Arizona State University Email: [email protected] Xinwen Zhang Huawei Research Center Email: [email protected] Gail-Joon
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
SAS 9.3 Management Console
SAS 9.3 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. SAS 9.3 Management Console: Guide to
Role-Based Access Control (RBAC): Features and Motivations
Role-Based Access Control (RBAC): Features and Motivations David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn National Institute of Standards and Technology U. S. Department of Commerce Gaithersburg
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Microsoft Project Server 2010 Administrator's Guide
Microsoft Project Server 2010 Administrator's Guide 1 Copyright This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references,
Database Design Overview. Conceptual Design ER Model. Entities and Entity Sets. Entity Set Representation. Keys
Database Design Overview Conceptual Design. The Entity-Relationship (ER) Model CS430/630 Lecture 12 Conceptual design The Entity-Relationship (ER) Model, UML High-level, close to human thinking Semantic
Module 9. User Interface Design. Version 2 CSE IIT, Kharagpur
Module 9 User Interface Design Lesson 21 Types of User Interfaces Specific Instructional Objectives Classify user interfaces into three main types. What are the different ways in which menu items can be
Bitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
Terms and Definitions for CMS Administrators, Architects, and Developers
Sitecore CMS 6 Glossary Rev. 081028 Sitecore CMS 6 Glossary Terms and Definitions for CMS Administrators, Architects, and Developers Table of Contents Chapter 1 Introduction... 3 1.1 Glossary... 4 Page
Relational model. Relational model - practice. Relational Database Definitions 9/27/11. Relational model. Relational Database: Terminology
COS 597A: Principles of Database and Information Systems elational model elational model A formal (mathematical) model to represent objects (data/information), relationships between objects Constraints
The Business Case for Data Governance
Contents of This White Paper Data Governance...1 Why Today s Solutions Fall Short...2 Use Cases...3 Reviewing Data Permissions... 3 Reviewing Data Permissions with Varonis... 3 Reviewing User and Group
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
9 Administering Shared Folders
9 Administering Shared Folders Exam Objectives in this Chapter: Manage and troubleshoot access to shared folders. Create and remove shared folders. Why This Chapter Matters Control access to shared folders
SAS 9.4 Management Console
SAS 9.4 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide to
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment
Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
A GTRBAC Based System for Dynamic Workflow Composition and Management
A GTRBAC Based System for Dynamic Workflow Composition and Management Basit Shafiq, Arjmand Samuel, and Halima Ghafoor Purdue University {shafiq, amsamuel}@ecn.purdue.edu Abstract In this paper, we propose
SAS 9.2 Management Console. Guide to Users and Permissions
SAS 9.2 Management Console Guide to Users and Permissions The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. SAS ) 9.2 Management Console: Guide to Users and Permissions.
Deploying a File Server Lesson 2
Deploying a File Server Lesson 2 Skills Matrix Technology Skill Objective Domain Objective # Adding a New Disk Configure storage 1.5 File Server The most basic and the most universal type of application
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Apache Sentry. Prasad Mujumdar [email protected] [email protected]
Apache Sentry Prasad Mujumdar [email protected] [email protected] Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture
Johannes Sametinger. C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria
OBJECT-ORIENTED DOCUMENTATION C. Doppler Laboratory for Software Engineering Johannes Kepler University of Linz A-4040 Linz, Austria Abstract Object-oriented programming improves the reusability of software
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
econtrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
