Skip to main content

Access Control

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems
  • 550 Accesses

Synonyms

Authorization verification

Definition

Access control deals with preventing unauthorized operations on the managed data. Access control is usually performed against a set of authorizations stated by Security Administrators (SAs) or users according to the access control policies of the organization. Authorizations are then processed by the access control mechanism (or reference monitor) to decide whether each access request can be authorized or should be denied.

Historical Background

Access control models for DBMSs have been greatly influenced by the models developed for the protection of operating system resources (see, for instance, the model proposed by Lampson [1], also known as the access matrix model, since authorizations are represented as a matrix). However, much of the early work on database protection was on inference control in statistical databases.

Then, in the 1970s, as research in relational databases began, attention was directed towards access control issues. As...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Lampson BW. Protection. Fifth Princeton symposium on information science and systems (Reprinted in). ACM Operat Syst Rev. 1974;8(1):18–24.

    Article  MATH  Google Scholar 

  2. Fagin R. On an authorization mechanism. ACM Trans Database Syst. 1978;3(3):310–9.

    Article  MathSciNet  Google Scholar 

  3. Griffiths PP, Wade BW. An authorization mechanism for a relational database system. ACM Trans Database Syst. 1976;1(3):242–55.

    Article  Google Scholar 

  4. Air Force Studies Board, Committee on Multilevel Data Management Security. Multilevel data management security. National Research Council; 1983.

    Google Scholar 

  5. Castano S, Fugini MG, Martella G, Samarati P. Database security. Addison-Wesley & ACM Press; 1995.

    Google Scholar 

  6. Ferrari E. Access control in data management systems. Synthesis lectures on data management. Morgan & Claypool Publishers; 2010.

    Google Scholar 

  7. Ferraiolo DF, Sandhu RS, Gavrila SI, Kuhn DR, Chandramouli R. Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur. 2001;4(3):224–74.

    Article  Google Scholar 

  8. Bertino E, Khan LR, Sandhu RS, Thuraisingham BM. Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans Syst Man Cybern A. 2006;36(3):429–38.

    Article  Google Scholar 

  9. Bertino E, Kirkpatrick MS. Location-based access control systems for mobile users: concepts and research directions. In: Proceedings of the 4th ACM IGSPATIAL International Workshop on Security and Privacy in GIS and LBS; 2011.

    Google Scholar 

  10. Carminati B, Ferrari E, Tan KL. A framework to enforce access control over data streams. ACM Trans Inf Syst Secur. 2011;8(3):337–52.

    Google Scholar 

  11. Carminati B, Ferrari E, Viviani M. Security and trust in online social networks, synthesis lectures on information security, privacy and trust. Morgan & Claypool; 2013.

    Google Scholar 

  12. Kuner C, Cate F, Millard C, Svantesson D. The challenge of big data for data protection. Int Data Priv Law. 2012;2(2).

    Google Scholar 

  13. Takabi H, Joshi James BD, Gail-Joon A. Security and privacy challenges in cloud computing environments. IEEE Secur Priv. 2010;8(6):24–31.

    Article  Google Scholar 

  14. Ferrari E, Thuraisingham BM. Security and privacy for web databases and services. In: Advances in Database Technology, Proceedings of the 9th International Conference on Extending Database Technology; 2004. p. 17–28.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elena Ferrari .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ferrari, E. (2018). Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_6

Download citation

Publish with us

Policies and ethics