Reference Hub1
Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS

Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS

Suraj Krishna Patil, Sandipkumar Chandrakant Sagare, Alankar Shantaram Shelar
Copyright: © 2020 |Volume: 8 |Issue: 1 |Pages: 10
ISSN: 2166-7160|EISSN: 2166-7179|EISBN13: 9781799808091|DOI: 10.4018/IJSI.2020010105
Cite Article Cite Article

MLA

Patil, Suraj Krishna, et al. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS." IJSI vol.8, no.1 2020: pp.82-91. http://doi.org/10.4018/IJSI.2020010105

APA

Patil, S. K., Sagare, S. C., & Shelar, A. S. (2020). Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS. International Journal of Software Innovation (IJSI), 8(1), 82-91. http://doi.org/10.4018/IJSI.2020010105

Chicago

Patil, Suraj Krishna, Sandipkumar Chandrakant Sagare, and Alankar Shantaram Shelar. "Use of Purpose and Role Based Access Control Mechanisms to Protect Data Within RDBMS," International Journal of Software Innovation (IJSI) 8, no.1: 82-91. http://doi.org/10.4018/IJSI.2020010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Privacy is the key factor to handle personal and sensitive data, which in large chunks, is stored by database management systems (DBMS). It provides tools and mechanisms to access and analyze data within it. Privacy preservation converts original data into some unknown form, thus protecting personal and sensitive information. Different access control mechanisms such as discretionary access control, mandatory access control is used in DBMS. However, they hardly consider purpose and role-based access control in DBMS, which incorporates policy specification and enforcement. The role based access control (RBAC) regulates the access to resources based on the roles of individual users. Purpose based access control (PuBAC) regulates the access to resources based on purpose for which data can be accessed. It regulates execution of queries based on purpose. The PuRBAC system uses the policies of both, i.e. PuBAC and RBAC, to enforce within RDBMS.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.