Encyclopedia of Database Systems

Editors: LING LIU, M. TAMER ÖZSU

Access Control

  • Elena Ferrari
Reference work entry
DOI: https://doi.org/10.1007/978-0-387-39940-9_6

Synonyms

Definition

Access control deals with preventing unauthorized operations on the managed data. Access control is usually performed against a set of authorizations stated by Security Administrators (SAs) or users according to the access control policies of the organization. Authorizations are then processed by the access control mechanism (or reference monitor) to decide whether each access request can be authorized or should be denied.

Historical Background

Access control models for DBMSs have been greatly influenced by the models developed for the protection of operating system resources. For instance, the model proposed by Lampson [16] is also known as the access matrix model since authorizations are represented as a matrix. However, much of the early work on database protection was on inference control in statistical databases.

Then, in the 1970s, as research in relational databases began, attention was directed towards access control issues. As...

This is a preview of subscription content, log in to check access

Recommended Reading

  1. 1.
    Air Force Studies Board, Committee on Multilevel Data Management Security. Multilevel data management security. National Research Council, 1983.Google Scholar
  2. 2.
    Berners-Lee T. et al. The semantic web. Scientific American, 2001.Google Scholar
  3. 3.
    Bertino E., and Sandhu R.S. Database security: concepts, approaches, and challenges. IEEE Trans. Dependable and Secure Computing, 2(1):2–19, 2005.CrossRefGoogle Scholar
  4. 4.
    Bertino E., Khan L.R., Sandhu R.S., and Thuraisingham B.M. Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans. Syst. Man Cybern. A, 36(3):429–438, 2006.CrossRefGoogle Scholar
  5. 5.
    Carminati B., Ferrari E., and Perego A. Enforcing access control in web-based social networks. ACM trans. Inf. Syst. Secur., to appear.Google Scholar
  6. 6.
    Carminati B., Ferrari E., and Tan K.L. A framework to enforce access control over Data Streams. ACM Trans. Inf. Syst. Secur., to appear.Google Scholar
  7. 7.
    Carminati B., Ferrari E., and Thuraisingham B.M. Access control for web data: models and policy languages. Ann. Telecomm., 61(3–4):245–266, 2006.Google Scholar
  8. 8.
    Carminati B., Ferrari E., and Bertino E. Securing XML data in third party distribution systems. In Proc. of the ACM Fourteenth Conference on Information and Knowledge Management, 2005.Google Scholar
  9. 9.
    Castano S., Fugini M.G., Martella G., and Samarati P. Database security. Addison Wesley, 1995.Google Scholar
  10. 10.
    Damiani M.L. and Bertino E. Access control systems for geo-spatial data and applications. In Modelling and management of geographical data over distributed architectures, A. Belussi, B. Catania, E. Clementini, E. Ferrari (eds.). Springer, 2007.Google Scholar
  11. 11.
    Fagin R. On an authorization mechanism. ACM Trans. Database Syst., 3(3):310–319, 1978.CrossRefGoogle Scholar
  12. 12.
    Ferraiolo D.F., Sandhu R.S., Gavrila S.I., Kuhn D.R., and Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224–274, 2001.CrossRefGoogle Scholar
  13. 13.
    Ferrari E. and Thuraisingham B.M. Security and privacy for web databases and services. In Advances in Database Technology, Proc. 9th Int. Conf. on Extending Database Technology, 2004, pp. 17–28.Google Scholar
  14. 14.
    Ferrari E. and Thuraisingham B.M. Secure database systems. In O. Diaz, M. Piattini (eds.). Advanced databases: technology and design. Artech House, 2000.Google Scholar
  15. 15.
    Griffiths P.P. and Wade B.W. An authorization mechanism for a relational database system. ACM Trans. Database Syst., 1(3):242–255, 1976.CrossRefGoogle Scholar
  16. 16.
    Lampson B.W. Protection. Fifth Princeton Symposium on Information Science and Systems, Reprinted in ACM Oper. Sys. Rev., 8(1):18–24, 1974.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • Elena Ferrari
    • 1
  1. 1.University of InsubriaVareseItaly