Skip to main content

Access Control

  • Living reference work entry
  • First Online:
Encyclopedia of Database Systems
  • 308 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Recommended Reading

  1. Lampson BW. Protection. Fifth Princeton symposium on information science and systems. Reprinted in ACM Operat Syst Rev. 1974;8(1):18–24.

    Google Scholar 

  2. Fagin R. On an authorization mechanism. ACM Trans Database Syst. 1978;3(3):310–9.

    Article  Google Scholar 

  3. Griffiths PP, Wade BW. An authorization mechanism for a relational database system. ACM Trans Database Syst. 1976;1(3):242–55.

    Article  Google Scholar 

  4. Air Force Studies Board, Committee on Multilevel Data Management Security. Multilevel data management security. National Research Council; 1983.

    Google Scholar 

  5. Castano S, Fugini MG, Martella G, Samarati P. Database security. Addison-Wesley & ACM Press; 1995.

    Google Scholar 

  6. Ferrari E. Access control in data management systems. Synthesis lectures on data management. Morgan & Claypool Publishers; 2010.

    Google Scholar 

  7. Ferraiolo DF, Sandhu RS, Gavrila SI, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur. 2001;4(3):224–74.

    Article  Google Scholar 

  8. Bertino E, Khan LR, Sandhu RS, Thuraisingham BM. Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans Syst Man Cybern A. 2006;36(3):429–38.

    Article  Google Scholar 

  9. Bertino E, Kirkpatrick MS. Location-based access control systems for mobile users: concepts and research directions. SPRINGL; 2011.

    Google Scholar 

  10. Carminati B, Ferrari E, Tan KL. A framework to enforce access control over data streams. ACM Trans Inf Syst Secur. 2011;8(3):337–52.

    Google Scholar 

  11. Carminati B, Ferrari E, Viviani M. Security and trust in online social networks, synthesis lectures on information security, privacy and trust. Morgan & Claypool; 2013.

    Google Scholar 

  12. Kuner C, Cate F, Millard C, Svantesson D. The challenge of big data for data protection. Int Data Priv Law. 2012;2(2).

    Google Scholar 

  13. Takabi H, Joshi James BD, Gail-Joon A. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010;8(6):24–31.

    Article  Google Scholar 

  14. Ferrari E, Thuraisingham BM. Security and privacy for web databases and services. In: Advances in Database Technology, Proceedings of 9th International Conference on Extending Database Technology; 2004. p. 17–28.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Ferrari .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Cite this entry

Ferrari, E. (2014). Access Control. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_6-3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7993-3_6-3

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Online ISBN: 978-1-4899-7993-3

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics