Please use this identifier to cite or link to this item: http://hdl.handle.net/10773/12831
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPereira, Óscar Mortáguapt
dc.contributor.authorRegateiro, Diogopt
dc.contributor.authorAguiar, Rui L.pt
dc.date.accessioned2014-11-17T09:45:45Z-
dc.date.available2014-11-17T09:45:45Z-
dc.date.issued2014-10-30-
dc.identifier.issn2336-0984pt
dc.identifier.urihttp://hdl.handle.net/10773/12831-
dc.description.abstractBusiness logics of relational databases applications are an important source of security violations, namely in respect to access control. The situation is particularly critical when access control policies are many and complex. In these cases, programmers of business logics can hardly master the established access control policies. Now we consider situations where business logics are built with tools such as JDBC and ODBC. These tools convey two sources of security threats: 1) the use of unauthorized Create, Read, Update and Delete (CRUD) expressions and also 2) the modification of data previously retrieved by Select statements. To overcome this security gap when Role-based access control policies are used, we propose an extension to the basic model in order to control the two sources of security threats. Finally, we present a software architectural model from which distributed and typed RBAC mechanisms are automatically built, this way relieving programmers from mastering any security schema. We demonstrate empirical evidence of the effectiveness of our proposal from a use case based on Java and JDBC.pt
dc.language.isoengpt
dc.publisherORB - Academic Publisherpt
dc.rightsopenAccesspor
dc.subjectRBACpt
dc.subjectAccess controlpt
dc.subjectInformation securitypt
dc.subjectSoftware architecturept
dc.subjectMiddlewarept
dc.subjectDistributed systemspt
dc.subjectRelational databasespt
dc.titleDistributed and typed role-based access control mechanisms driven by CRUD expressionspt
dc.typearticlept
dc.peerreviewedyespt
ua.distributioninternationalpt
degois.publication.firstPage1pt
degois.publication.issue1pt
degois.publication.lastPage11pt
degois.publication.titleInternational Journal of Computer Science: Theory and Application (IJCSTA)pt
degois.publication.volume2pt
dc.relation.publisherversionhttp://www.orb-academic.org/index.php/journal-of-computer-science/article/view/35pt
Appears in Collections:DETI - Artigos



FacebookTwitterLinkedIn
Formato BibTex MendeleyEndnote Degois 

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.