Header menu link for other important links
X
An active rule based approach to database security in E-commerce systems using temporal constraints
P. Ramasubramanian,
Published in
2003
Volume: 2
   
Pages: 1148 - 1152
Abstract
In this paper, we present a technique that can efficiently identify anomalous accesses to the database by using an Authorization Rule System which has been designed for implementing a user dynamic access control system which will secure inter-operation of independently managed database services in an open, distributed environment. Traditional authorization models do not adequately meet access control requirements typical to Databases, a separate Authorization Rule subsystem has been designed which is based on Temporal Event Matching Language(TEML). The rule specified in this security system is in Event-Time-Condition-Action (ETCA) format. XML is used for defining the authorization rules and the security rules. We could extract XML access control data from several platforms and represent the access control data for the entire enterprise through a common model. Similarly, access control data under an Enterprise Model can be translated to ones that are native to the platforms.
About the journal
JournalIEEE Region 10 Annual International Conference, Proceedings/TENCON