000 03937nam a22004935i 4500
001 978-3-031-01836-7
003 DE-He213
005 20240730163728.0
007 cr nn 008mamaa
008 220601s2010 sz | s |||| 0|eng d
020 _a9783031018367
_9978-3-031-01836-7
024 7 _a10.1007/978-3-031-01836-7
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aFerrari, Elena.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_980226
245 1 0 _aAccess Control in Data Management Systems
_h[electronic resource] :
_bA Visual Querying Perspective /
_cby Elena Ferrari.
250 _a1st ed. 2010.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2010.
300 _aXIV, 103 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Data Management,
_x2153-5426
505 0 _aAccess Control: Basic Concepts -- Discretionary Access Control for Relational Data Management Systems -- Discretionary Access Control for Advanced Data Models -- Mandatory Access Control -- Role-based Access Control -- Emerging Trends in Access Control.
520 _aAccess control is one of the fundamental services that any Data Management System should provide. Its main goal is to protect data from unauthorized read and write operations. This is particularly crucial in today's open and interconnected world, where each kind of information can be easily made available to a huge user population, and where a damage or misuse of data may have unpredictable consequences that go beyond the boundaries where data reside or have been generated. This book provides an overview of the various developments in access control for data management systems. Discretionary, mandatory, and role-based access control will be discussed, by surveying the most relevant proposals and analyzing the benefits and drawbacks of each paradigm in view of the requirements of different application domains. Access control mechanisms provided by commercial Data Management Systems are presented and discussed. Finally, the last part of the book is devoted to discussion of some of the most challenging and innovative research trends in the area of access control, such as those related to the Web 2.0 revolution or to the Database as a Service paradigm. This book is a valuable reference for an heterogeneous audience. It can be used as either an extended survey for people who are interested in access control or as a reference book for senior undergraduate or graduate courses in data security with a special focus on access control. It is also useful for technologists, researchers, managers, and developers who want to know more about access control and related emerging trends. Table of Contents: Access Control: Basic Concepts / Discretionary Access Control for Relational Data Management Systems / Discretionary Access Control for Advanced Data Models / Mandatory Access Control / Role-based Access Control / Emerging Trends in Access Control.
650 0 _aComputer networks .
_931572
650 0 _aData structures (Computer science).
_98188
650 0 _aInformation theory.
_914256
650 1 4 _aComputer Communication Networks.
_980227
650 2 4 _aData Structures and Information Theory.
_931923
710 2 _aSpringerLink (Online service)
_980228
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031007088
776 0 8 _iPrinted edition:
_z9783031029646
830 0 _aSynthesis Lectures on Data Management,
_x2153-5426
_980229
856 4 0 _uhttps://doi.org/10.1007/978-3-031-01836-7
912 _aZDB-2-SXSC
942 _cEBK
999 _c84921
_d84921