Detection of privilege abuse in RBAC administered database

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose an approach for detection of database privilege abuse in Role Based Access Control (RBAC) administered database. The proposed approach extracts the data dependencies among the attributes of relations of the database. Role based data dependency rule miner (RBDDRM) algorithm is used to mine role-wise data dependencies from database log. These data dependencies are considered as role profiles, which are used to detect the misuse of privileges by database users.

Cite

CITATION STYLE

APA

Rao, U. P., & Singh, N. K. (2015). Detection of privilege abuse in RBAC administered database. Studies in Computational Intelligence, 591, 57–76. https://doi.org/10.1007/978-3-319-14654-6_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free