{"title":"Implementation model for access control using log based security: Practical approach","authors":"Amritpal Singh","doi":"10.1109/ICACEA.2015.7164717","DOIUrl":null,"url":null,"abstract":"This paper proposes an implementation for access control in SQL Server, and the technique is to improve security of the data masking technique devised for secure data warehouse since it stores the sensitive information which needs to be secure from attackers. A large number of techniques have been proposed for the same but based on analysis those techniques produce large overheads. This technique can be implemented in database management system of any kind. By the help of proposed technique, it will get to know the behavior of access strongly based on mining process on intelligently recorded log and other metadata of respective access.","PeriodicalId":202893,"journal":{"name":"2015 International Conference on Advances in Computer Engineering and Applications","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Advances in Computer Engineering and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACEA.2015.7164717","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
This paper proposes an implementation for access control in SQL Server, and the technique is to improve security of the data masking technique devised for secure data warehouse since it stores the sensitive information which needs to be secure from attackers. A large number of techniques have been proposed for the same but based on analysis those techniques produce large overheads. This technique can be implemented in database management system of any kind. By the help of proposed technique, it will get to know the behavior of access strongly based on mining process on intelligently recorded log and other metadata of respective access.