Tool support for enforcing security policies on databases

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security requirements should be considered from the early stages of the development process. However, such requirements tend to be neglected or dealt-with only at the end of the development process. The Security Modeling Tool presented in this paper aims at guiding and enforcing developers, in particular database designers, to deal with database authorization requirements from the early stages of the development process. In this paper we demonstrate how the Security Modeling Tool assists the various stakeholders in designing secure database code and describe the tool architecture. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Abramov, J., Anson, O., Sturm, A., & Shoval, P. (2012). Tool support for enforcing security policies on databases. In Lecture Notes in Business Information Processing (Vol. 107 LNBIP, pp. 126–141). Springer Verlag. https://doi.org/10.1007/978-3-642-29749-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free