tailieunhanh - Security in Information Systems: Chapter 2 - Discretionary access control

Security in Information Systems: Chapter 2 - Discretionary access control Introduction to Discretionary Access Control, Propose Models for DAC, SQL for Data Control, DAC & Information Flow Controls. | DISCRETIONARY ACCESS CONTROL Tran Thi Que Nguyet Faculty of Computer Science Engineering HCMC University of Technology ttqnguyet@ Outline 1 Introduction to Discretionary Access Control 2 Propose Models for DAC 3 SQL for Data Control 4 DAC Information Flow Controls Homework Case study in SQL Server 2008 - Reading chapter 4 - Access control for Databases Concepts and Systems. Elisa Bertino et al. Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering 2011 Information Systems Security Chapter 2 Introduction to DAC 2 Introduction to DAC Discretionary Access Control DAC User can protect what they own. The owner is given all privileges on their own data. The owner can define the type of access read write execute . and grant access to others. The typical method of enforcing DAC in a database system is based on the granting and revoking privileges Ho Chi Minh City University of Technology Faculty of Computer Science and Engineering 2011 Information Systems Security Chapter 2 Introduction to DAC