A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Risk Management in Access Control Policies
2017
Position Papers of the 2017 Federated Conference on Computer Science and Information Systems
The evolution of information systems and their openness to their socio-economic environment has led to new needs in terms of security. At the heart of information systems, Database Management Systems (DBMS) are increasingly exposed to specific intrusion types, including internal threats due to authorized users. In addition, the access control policy (ACP) defined on a database schema is stored at the same location as the data it protects and is thus highly prone to corruption attempts such as
doi:10.15439/2017f555
dblp:conf/fedcsis/EvinaAJ17
fatcat:ib3wxihicjd7ro7wnagx5clcmu