van Staden, 2003 - Google Patents
The use of a virtual machine as an access control mechanism in a relational database management systemvan Staden, 2003
View PDF- Document ID
- 15748053269391899090
- Author
- van Staden W
- Publication year
- Publication venue
- PQDT-Global
External Links
Snippet
The use of a virtual machine as an access control mechanism in a relational database
management system by Wynand Johannes Christ Page 1 The use of a virtual machine as an
access control mechanism in a relational database management system by Wynand Johannes …
- 230000007246 mechanism 0 title abstract description 42
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement, balancing against orders
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ferrari | Access Control in Data Management Systems: A Visual Querying Perspective | |
| Schultz et al. | IFDB: decentralized information flow control for databases | |
| US7200869B1 (en) | System and method for protecting domain data against unauthorized modification | |
| JP4892179B2 (en) | Zone-based security management for data items | |
| Braumandl et al. | ObjectGlobe: Ubiquitous query processing on the Internet | |
| US7640429B2 (en) | Cryptographically enforced, multiple-role, policy-enabled object dissemination control mechanism | |
| Bertino et al. | Database security: Research and practice | |
| Bertino | Data security | |
| US20050004924A1 (en) | Control of access to databases | |
| Ferrari | Secure database systems | |
| CN112738194A (en) | Access control system for safe operation and maintenance management | |
| WO2000056027A1 (en) | Computer security system | |
| Pernul | Information systems security: Scope, state-of-the-art, and evaluation of techniques | |
| Ge et al. | Secure databases: an analysis of Clark-Wilson model in a database environment | |
| Delessy et al. | Patterns for access control in distributed systems | |
| JP2002149494A (en) | Access control method, access control device, and recording medium | |
| van Staden | The use of a virtual machine as an access control mechanism in a relational database management system | |
| Stallings | Operating system security | |
| Bhatnagar | Security in Relational Databases | |
| Lazouski et al. | A survey of usage control in computer security | |
| Yang et al. | Security policy refinement: High-level specification to low-level implementation | |
| Hardy | An implementation and analysis of the configurable security architecture | |
| Ooi | Access control for an object-oriented distributed platform | |
| Kapnoullas et al. | Security framework for mobile agent platforms (SFMAP) | |
| Kose | Distributed Database Security |