Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Role authentication for secure DBMS

Full metadata record
DC Field Value Language
dc.contributor.authorRyoo, D.-
dc.contributor.authorKim, S.-
dc.contributor.authorJun, M.-
dc.date.available2019-04-10T11:51:42Z-
dc.date.created2018-04-17-
dc.date.issued2005-
dc.identifier.isbn1932415823-
dc.identifier.urihttp://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/34106-
dc.description.abstractPublic Key Infrastructure(PKI) is the prevalent method of authentication. Privilege Management Infrastructure(PMI) as a new technology can provide the user's attribute information. The main function of PMI is to give more specified authority and a role to the user. And Role Based Access Control(RBAC) is implemented by digital signature. RBAC provides some flexibility for security management. To protect DB from hacking, we propose a secure DBMS using this PMI and RBAC. Application of DB encryption can be one of key technologies for contents protection. In this paper, we have applied the access control based on RBAC to prevent the unauthorized users from gaining access to contents and propose a new DB encryption scheme which uses RBAC and digital signature based on PMI.-
dc.relation.isPartOfProceedings of The 2005 International Conference on Security and Management, SAM'05-
dc.titleRole authentication for secure DBMS-
dc.typeConference-
dc.type.rimsCONF-
dc.identifier.bibliographicCitation2005 International Conference on Security and Management, SAM'05, pp.304 - 310-
dc.description.journalClass2-
dc.identifier.scopusid2-s2.0-62349110411-
dc.citation.conferenceDate2005-06-20-
dc.citation.conferencePlaceLas Vegas, NV-
dc.citation.endPage310-
dc.citation.startPage304-
dc.citation.title2005 International Conference on Security and Management, SAM'05-
dc.contributor.affiliatedAuthorJun, M.-
dc.type.docTypeConference Paper-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Information Technology > School of Computer Science and Engineering > 2. Conference Papers

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE