IJEM Vol. 1, No. 2, 8 Apr. 2011
Cover page and Table of Contents: PDF (size: 129KB)
Full Text (PDF, 129KB), PP.28-32
Views: 0 Downloads: 0
Grained access control, database, virtual private database, security policy, row-level security
Virtual Private Database (VPD) ensures the privacy of information and prevents direct data leakage through computer terminals by providing Fine-grained Access Control (FGAC). This paper firstly introduces the security requirements of the test database management system and based on which, further analyzes the existing shortcomings in access control technology. Through a brief introduction of VPD, the security design of the test database management system is then described, in which both the security and flexibility of the system are increased and the information leaks and other security related problems of the system are solved.
Wang Guan, Yan Rui,"The Application of VPD in University Entrance Examination Management System", IJEM, vol.1, no.2, pp.28-32, 2011. DOI: 10.5815/ijem.2011.02.05
[1] Jingmin He, Min Wang. Cryptography and Relational Database Management System, Interactive Dialogue with Educator from Across State, 2001, pp.273–284. (in Chinese)
[2] R.Agrawal and J.Kiernan, Watermarking Relational Databases, In the proceedings of the International Conference on Very Lgare Databases, 2002, pp.155–166.
[3] Cheng-rong Wu and Shi-yong Zhang, Database Access Control Models, Computer Engineering and Applications, 2002, pp.169–185. (in Chinese)
[4] Rizvi R, Mendelzon A and Sudarshan S, Extending Query Rewriting Techniques for Fine-Grained Access Control, 2004, pp.13–18.
[5] U Maheshwari, R Vingralek amd W Shapiro, How to build a Trusted Database System on Untrusted Storage. In the proceedings of Operating System Design and Implementation, 2000, pp.135–150.
[6] Denning D. E. Field Encryption and authentication. Chaum Ded.Advancds in Cryptology. Proceedings of Crypto’s 83.Unvi.Of California.Santa Barbare.CA.1983. Plenum Press. 1984, pp.231–247.
[7] The Virtual Private Database in Oracle9i. An Oracle Technical White Paper. http://otn.oracle.com/deploy/security/oracle9ir2/pdf/vpd9ir2twp.pdf.