Показать сокращенную информацию
dc.date.accessioned | 2024-11-21T10:53:39Z | |
dc.date.available | 2024-11-21T10:53:39Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | 2234-1579 | |
dc.identifier.other | doi.org/10.3991/ijim.v17i14.36073 | |
dc.identifier.uri | http://rep.enu.kz/handle/enu/19159 | |
dc.description.abstract | Most modern database management systems (DBMS) provide the ability to restrict user access to database objects. The problems of restricting access to individual records are arising increasingly in connection with the growing need for flexibility in restricting access in modern databases, including when using them to store information classified as state or commercial secrets. Currently, these tasks are solved individually, and there are no commonly formalized approaches to designing such access restrictions. The study aims to reduce the design time for database schemes when it is necessary to restrict access to individual records of the database tables and improve the quality of the designed schemes by using the proposed algorithms. Questions about the design of the protected databases with the use of access restrictions to separate records are considered. Both restriction of illegal access to records, and granting false camouflage information instead of required is considered. The proposed software package will consist of 2 main parts: a database and a client application. To differentiate access, the study proposed the use of a record-protecting lock. | ru |
dc.language.iso | en | ru |
dc.publisher | iJIM | ru |
dc.relation.ispartofseries | Vol. 17, No. 14; | |
dc.subject | client-server | ru |
dc.subject | database | ru |
dc.subject | database management system | ru |
dc.subject | model | ru |
dc.subject | software | ru |
dc.title | Providing Access Isolation to Information in the Database | ru |
dc.type | Article | ru |