Skip to main content

Discretionary Access Control

  • Reference work entry
  • First Online:
Encyclopedia of Database Systems

gahn@asu.edu

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 4,499.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 6,499.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Amazon. Amazon simple storage service (S3). 2011.

    Google Scholar 

  2. Amazon. Amazon web services: risk and compliance (2012), http://media.amazonwebservices.com/.

  3. Bertino E, Samarati P, Jajodia S. Authorizations in relational database management systems. In: Proceedings of the 1st ACM Conference on Computer and Communication Security; 1993. p. 130–9.

    Google Scholar 

  4. Bishop M. Computer security: art and science. Boston: Addison Wesley Professional; 2003.

    Google Scholar 

  5. Calero J, Edwards N, Kirschnick J, Wilcock L, Wray M. Toward a multi-tenancy authorization system for cloud services. IEEE Secur Priv. 2010;8(6):48–55.

    Article  Google Scholar 

  6. Castano S, Fugini MG, Martella G, Samarati P. Database security. Wokingham: Addison Wesley; 1994.

    MATH  Google Scholar 

  7. Fagin R. On an authorization mechanism. ACM Trans Database Syst. 1978;3(3):310–19.

    Article  MathSciNet  Google Scholar 

  8. Ferraiolo DF, Gilbert DM, Lynch N. An examination of federal and commercial access control policy needs. In: Proceedings of the NIST-NCSC National Computer Security Conference; 1993. p. 107–16.

    Google Scholar 

  9. Graham GS, Denning PJ. Protection: principles and practice. In: Proceedings of the AFIPS Spring Joint Computer Conference; 1972. p. 417–29.

    Google Scholar 

  10. Griffiths PP, Wade BW. An authorization mechanism for a relational database system. ACM Trans Database Syst. 1976;1(3):242–55.

    Article  Google Scholar 

  11. Lampson BW. Protection. In: 5th Princeton symposium on information science and systems. 1971. p. 437–43. Reprinted in ACM Oper Syst Rev. 1974;8(1):18–24.

    Article  Google Scholar 

  12. Rabitti F, Bertino E, Kim W, Woelk D. A model of authorization for next-generation database systems. ACM Trans Database Syst. 1991;16(1):88–131.

    Article  Google Scholar 

  13. Sandhu RS, Samarati P. Access control: principles and practice. IEEE Commun. 1994;32(9):40–8.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gail-Joon Ahn .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Science+Business Media, LLC, part of Springer Nature

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Ahn, GJ. (2018). Discretionary Access Control. In: Liu, L., Özsu, M.T. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8265-9_135

Download citation

Publish with us

Policies and ethics