preview

Essay on An Introduction to Access Control Mechanisms

Best Essays

Abstract: With increasing attacks and internal data theft the organizations must strengthen their database security beyond the traditional methods, especially those databases which hold private data. This can be done by developing a security strategy which is a framework of control mechanisms for authentication, authorization, and access control mechanisms to enforce role separation, database auditing, monitoring, network and data encryption, data masking according to the needs and environment in the organization. To develop a high-quality security strategy detailed knowledge and understanding about the database control mechanisms is needed. So the main purpose of this paper is to give a detailed description of security mechanisms which …show more content…

Databases will be the prime target of such intrusion attacks, largely because they hold the most valuable data and are vulnerable unless carefully secured. The purpose of this paper is to explain about intrinsic database security mechanisms for the relational database management systems which will minimize these threats. Database security professionals should develop a security strategy which provides not only the basic security features authentication, authorization, and access control but also aligns database security policies with information security policies; ensure well-defined and formalized database security procedures; enforce role separation; and apply advanced security measures such as database auditing, monitoring, database encryption, data masking, and vulnerability assessment to all critical databases that store private data.

Literature Review:
In this paper “The inference problem: a survey” [Farkas, 2002] the author states that the access control models protects the data from direct access but not from the indirect access via inference channels which occurs when sensitive data is inferred from non-sensitive data and metadata. The survey results of the inference control in different database management systems are mentioned and specific methods for detection and removal of the inference channels to guarantee security are described. Problems related to semantic web are described in detail

Get Access