Will database researchers have any role in data security? (panel session)
Abstract
Index Terms
- Will database researchers have any role in data security? (panel session)
Recommendations
Will database researchers have any role in data security? (panel session)
SIGMOD '01: Proceedings of the 2001 ACM SIGMOD international conference on Management of dataData security issues today go far beyond the traditional questions of grant/revoke in an RDBMS. We will discuss what the new research agenda should be.
What can researchers do to improve security of data and documents? (panel description)
CIKM '01: Proceedings of the tenth international conference on Information and knowledge managementData security (protection of information rather than systems) goes far beyond the traditional questions of RDBMS grant/revole, or security markings on documents. We will discuss what the new research agenda should be to impact the masses of systems.
An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
ICFNDS '17: Proceedings of the International Conference on Future Networks and Distributed SystemsRole-based access control (RBAC) is a widely-used protocol to design and build an access control for providing the system security regarding authorization. Even though in the context of internet resources access, the authentication and access control ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image ACM SIGMOD Record](/cms/asset/6d1bf5e2-4d18-43ae-82d5-c4db479e2d7c/3712311.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 494Total Downloads
- Downloads (Last 12 months)3
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in