CN101075254A - Autonomous access control method for row-level data of database table - Google Patents

Autonomous access control method for row-level data of database table Download PDF

Info

Publication number
CN101075254A
CN101075254A CN200710100355.8A CN200710100355A CN101075254A CN 101075254 A CN101075254 A CN 101075254A CN 200710100355 A CN200710100355 A CN 200710100355A CN 101075254 A CN101075254 A CN 101075254A
Authority
CN
China
Prior art keywords
access control
row
user
level
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN200710100355.8A
Other languages
Chinese (zh)
Other versions
CN100498792C (en
Inventor
王渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Aerospace Software Technology Co ltd
Original Assignee
Beijing Shenzhou Aerospace Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Aerospace Software Technology Co ltd filed Critical Beijing Shenzhou Aerospace Software Technology Co ltd
Priority to CNB2007101003558A priority Critical patent/CN100498792C/en
Publication of CN101075254A publication Critical patent/CN101075254A/en
Application granted granted Critical
Publication of CN100498792C publication Critical patent/CN100498792C/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to an autonomous access control method of row-level data of a database table, which comprises the following steps: A. establishing a row-level access control strategy: adding a row-level access control authority column for each database table which enables row-level access control, wherein the row-level access control authority column is used for recording the access control authority information of the row; B. granting row-level access to the user: granting access authority and access type of corresponding rows in a database table to database users; C. row level access control: and when the user accesses the database table, implementing level access control on the user according to the line level access control strategy and the line level access authority granted to the user. The invention establishes the row-level access control strategy on the database table, grants the row-level access authority to the user, realizes the row-level access control on the user, effectively protects the row-level data of the database, overcomes the defect of overlarge granularity of the traditional database table-level and attribute-level autonomous access control, and improves the security of the database.

Description

The autonomous access control method of database list row DBMS
Technical field
The present invention relates to a kind of autonomous access control method, specifically, relate to a kind of autonomous access control method of database list row level data database table.
Background technology
Autonomous access control is the basis of operating system and data base management system, and its a important attribute is to support the delegable rule.At present, the autonomous access control of numerous databases is based on access control matrix (AccessControl Matrix) and realizes the table level to the role, the access control of attribute level (row level), this class access control can be to some row control that conduct interviews in the table in the database, the table, but this class access control can not retrain the row access in the database.For example, if database user has the access rights of certain database table, just then this user can be to each the line correlation visit of advancing in this table.So this traditional table level, the object permission management of attribute level (row level) granularity can not be satisfied the now security requirement of Database Systems fully, particularly can not satisfy the security requirement that the information in a plurality of heterogeneous databases is incorporated into Database Systems together.
Summary of the invention
The purpose of this invention is to provide a kind of control method of independently accessing for the database list row DBMS, this method can satisfy various demands to the high Database Systems of security requirement.
For achieving the above object, the present invention is by the following technical solutions:
A kind of autonomous access control method of database list row level data is characterized in that it may further comprise the steps:
A. set up a row level access control policy: opening database table for each of enabling the access control of row level increases delegation's level access control right row, is used for the access control right information of this delegation of record;
B. authorize user's row level access rights: the access rights for database user is authorized corresponding line in the database table reach access type;
C. row level access control: when the user conducts interviews to database table, according to above line level access control policy and row level access rights of authorizing this user, this user is implemented the access control of row level.
Described step B specifically comprises:
B1. according to whether row level access control right row are arranged in the database table, judge whether database table sets up row level access control policy, if do not set up, then can't authorize for the user row level access rights of this database table, flow process finishes; If set up row level access control policy, then continued step b2;
B2. search the side-play amount whether this user is arranged in the correspondence database table by the autonomous access control system table of row level, judge whether it is the row level access rights of authorizing for the first time this table for this user, if be this subscriber authorisation, then turn to step b3; If no, this user of record namely increases by a line item for the authorization message of this database table in grade autonomous access control system table of then being expert at, and is used for the row of recording user on database table and authorizes side-play amount;
B3. in the database table of this subscriber authorisation, revise the value of authorizing every trade level access control right to be listed as, this user of value representation of amended row level access control right row can be to the database manipulation of this row execution in this table.
Described step C specifically comprises:
C1. judge that whether this user is the founder of tables of data, if so, then successfully returns;
C2. judge whether this user has the access rights of this table, if having, then continue step c3, if do not have, then this user's access failure;
C3. by whether comprising row level access control right row in the decision data table, judge whether this table opens the access control of row level, if do not open, showing does not need to go a grade autonomous access control inspection, and the user has access rights, and flow process finishes; If open, then continue step c4;
C4. search the side-play amount of database user in this tables of data from the autonomous access control system table of row level, if there is not user's offset information, show that then the user haves no right this table is conducted interviews, flow process finishes, and the user accesses failure; If user's offset information is arranged, then by user's the authority information of table side-play amount consumer positioning on this table, judge thus whether the user has relevant row level access control right.
Advantage of the present invention is: the present invention expands on the basis of table level, the autonomous access control of attribute level; set up row level access control policy in database table; for the user authorizes row level access rights; realized the row level access control to the user; effectively protected the database row DBMS; overcome traditional database table level, the excessive shortcoming of the autonomous access control granularity of attribute level, database security is improved.
Description of drawings
Fig. 1 is row level access control model figure;
Fig. 2 is a process flow diagram of authorizing user's row level access rights;
Fig. 3 is row level access control right check process figure.
Embodiment
The present invention revises database table, has increased by row in the tables of data of having used the autonomous access control policy of capable level, is used to write down the row level authorization conditions of each bar record row, to realize the autonomous access control of row level.Meanwhile, record the side-play amount of database user in this database table in grade autonomous access control system table of being expert at, find this user at the authority information of this record row by this side-play amount.
The autonomous access control model structural drawing of row level as shown in Figure 1.
Used and comprised following data object in the autonomous database of visiting of capable level:
● system table: the autonomous access control system table (sys_user_row_privilege) of row level, this table is mainly used in recording the information of the database table of having used capable level access control policy, comprising: used the side-play amount to tables of data (T1) (offset) that the title (T1) of the table of capable level access control, the user (U1) with access T1 authority and user (U1) have.Offset is integer data, and in the middle of its this scope of big or small stuck-at--16, side-play amount is used for help system mark user's a row level access control information.
● used the tables of data (T1) of capable level access control policy, used and comprised 64 integers row that a row system creates automatically in the tables of data of capable level access control policy: row level access control right row (ROWPRI).These row have write down the access control information of this line item.The autonomous access control of row level can be carried out Authorized operation for 16 users (U1-U16), per four bit-identifies in the row level access control right row (ROWPRI) user's access rights (represented respectively read, upgrade, delete, whole operation permission), as the 1-4 bit-identify access control right of user U1, the 5-8 bit-identify user U2 access control right.And identified side-play amount corresponding to user in the autonomous access control system table (sys_user_row_privilege) of row level.
For this reason, we can define following formula, are used for obtaining the autonomous access control right of row level of user Ui:
(Ui, T), this function is imported the table T of user profile Ui, user capture to defined function offset, returns user's side-play amount.
Therefore, the row level access control right information of user ui is made up of following four of the authority row of the row level access control of corresponding row among the table T:
offset(ui,T)*4-offset(ui,T)*4+3
The inventive method may further comprise the steps:
A. set up a row level access control policy: opening database table for each of enabling the access control of row level increases by row, this classifies row level access control right row as, row row level access control right row by name (ROWPRI), the row type is 64 integers, is used to write down the access control right information of this delegation;
In implementation, the default value of ROWPRI row of carrying out the database table of row level access control can be made as 0, and at this moment, except the founder of this table, other all database users all can not be inquired about this table, the operation of modification, deletion record.
B. authorize user's row level access rights: for specifying, the user can access which row in the database table, and access type.
As shown in Figure 2, the concrete steps of user U accessing database table T comprise:
B1. judge whether database table T sets up row level access control policy, if database table has been used the access control of capable level, will increase so row level access control right row ROWPRI in this tables of data, set up capable level access control policy to show this tables of data.If do not set up row level access control policy, then can't authorize for the user row level access rights of this database table T, flow process finishes.If set up row level access control policy, then continued step b2;
B2. judge whether it is the row level access rights of authorizing for the first time this table for user U, by searching the autonomous access control system table of row level, search the side-play amount that whether has user U among the correspondence database table T.If no, then show it is to authorize for this user for the first time.If for the first time, then be expert in grade autonomous access control system table this user of record for the authorization message of this database table, namely being expert at increases by a line item in grade autonomous access control system table, and the row of recording user on database table T authorized side-play amount offset.This side-play amount sign has been used the side-play amount of authorized user in the access control list of capable level.This record comprises the ID of authorized user, the ID of database table (unique ID sign of database table T correspondence) and the side-play amount of this user on database table T, if be this subscriber authorisation, then leaps to b3.
B3. in the database table of this subscriber authorisation, revise the value of authorizing every trade level access control right row ROWPRI, the database manipulation that this row was carried out during this user of value representation of amended row level access control right row ROWPRI can show this.
The user can comprise deletion action (DELETEOPER), upgrade operation (UPDATEOPER), query manipulation (SELECTOPER) to the database manipulation that this row is carried out.
C. row level access control: when the user conducts interviews to database table, according to above line level access control policy and row level access rights of authorizing this user, this user is implemented the access control of row level.As shown in Figure 3, concrete steps comprise:
C1. judge that whether this user is the founder of tables of data, if so, then successfully returns.
C2. judge whether this user has the access rights of this table, if having, then continue step c3, if do not have, then this user's access failure;
C3. judge whether this table opens the access control of row level, and by whether comprising row level access control right row (ROWPRI) in the decision data table, promptly whether decidable has opened capable level access control policy.If open, then continue step c4, if do not open, then do not need to go a grade autonomous access control inspection, flow process finishes, and the user has access rights;
C4. search the side-play amount of database user in this tables of data from the autonomous access control system table of row level, if there is not user's offset information, show that then the user haves no right this table is conducted interviews, flow process finishes, and the user accesses failure; If user's offset information is arranged, just pass through user's the authority information of table side-play amount consumer positioning on this table, judge thus whether the user has a relevant row level access control right.
In actual applications, the autonomous access control of this database list row DBMS can combine with the autonomous access control based on the role, with configuration disparate databases role different row level access rights in database table.
The present invention is achieved in Oscar safety database system.In Oscar safety database system, on important table, set up capable level access control policy, the user then must just can realize by row level access control process if certain of wanting to visit in this system is opened table.
In this system, domestic consumer checks the wage information slip of oneself only, and the leader of section office can check all employees' of its place section office wage information slip.Therefore, when design database, set up capable level access control policy on the wage information slip, system has increased the ROWPRI row automatically on the wage information slip, be used for the access control side-play amount of this row of record.
After creating this wage information slip, the authority of at first giving all employee's query manipulations, namely all employees can view the information in this wage information slip.Authorize user's row level access rights at this wage information slip for each role then.Afterwards, this system just can judge whether visiting user can operate accordingly to this wage information slip by the row level access control policy of wage information slip and each user's row level access rights.
For example, Peng Fei is the manager of product quality portion, and he can inquire about all employees' of this department wage situation.Therefore, the system manager authorizes row level access rights to role " manager of product quality section ".Operation steps is as follows:
Step 1: payroll is used the autonomous access control policy of row level, and DBA user imports following statement in interactive SQL instrument:
select?apply_row_control(′COMPANY′,′Wage′);
Wherein, COMPANY is the pattern at payroll place, Wage is the payroll table name, the semanteme of apply_row_control system function is exactly that the named list under the designated mode is used row level access control policy, used should strategy after, increased by a row ROWPRI in the payroll, be used for writing down the row level authorization conditions of each record.At this moment, the value of ROWPRI row is 0, has only the founder of payroll could visit each line item.
Step 2: for Peng Fei arranges autonomous access control right, DBA user imports following statement in interactive SQL instrument:
update?company.wage?set?rowpri=getrowpriv(′COMPANY′,′WAGE′,′PengFei′,rowpri,0,false,true,false)where?department=′ProductQuality′;
The line item collection of mandate at first need to be selected in this statement by the where querying condition, revise the ROWPRI value that line item is concentrated each bar record by the update statement then, can obtain the side-play amount of Peng Fei in payroll by the getrowpriv function, make amendment in the position of then side-play amount in the ROWPRI row being pointed to, to be reached for the purpose of user Peng Feijin every trade level mandate.The ROWPRIV value of each record row is that user's side-play amount of 0, Peng Fei is 1 before revising, and then will revise the numerical value of the correspondence position of ROWPRI, and the ROWPRI value is 0x00000002 after revising.
Before the mandate, during the Peng Fei access employee of this department wage information slip, the access failure does not namely show any data.
After the mandate, when the Peng Fei access employee of this department wage information slip, system judges that to the row level access of Peng Fei deterministic process is:
Process 1: judge that can whether Peng Fei visit the wage information slip, if can not visit, then returns error message.
Process 2: search the side-play amount table_offset of Peng Fei in the wage information slip
Process 3: by table_offset, locate Peng Fei in the row level access rights of each bar payroll records, and judge that according to this can Peng Fei conduct interviews to nominated bank.
Owing to authorized the access rights of inquiring about all employee's wage situations of this department to Peng Fei, when the Peng Fei visit employee of this department wage information slip, he can view all employees' of this product quality portion wage situation information.
As seen; the present invention expands on the basis of table level, the autonomous access control of attribute level; on database table, set up row level access control policy; for the user authorizes row level access rights; realized the access control scheme of capable level granularity; effectively protected the row level sensitive data in the database, overcome traditional database table level, the excessive shortcoming of the autonomous access control granularity of attribute level, database security is improved.

Claims (3)

1, a kind of autonomous access control method of database list row level data is characterized in that it may further comprise the steps:
A. set up a row level access control policy: opening database table for each of enabling the access control of row level increases delegation's level access control right row, is used for the access control right information of this delegation of record;
B. authorize user's row level access rights: the access rights and the access type of authorizing corresponding line in the database table for database user;
C. row level access control: when the user conducts interviews to database table, according to above line level access control policy and row level access rights of authorizing this user, this user is implemented the access control of row level.
2, the autonomous access control method of database list row level data according to claim 1 is characterized in that:
Described step B specifically comprises:
B1. according to whether row level access control right row are arranged in the database table, judge whether database table sets up row level access control policy, if do not set up, then can't authorize for the user row level access rights of this database table, flow process finishes; If set up row level access control policy, then continued step b2;
B2. search the side-play amount whether this user is arranged in the correspondence database table by the autonomous access control system table of row level, judge whether it is the row level access rights of authorizing for the first time this table for this user, if be this subscriber authorisation, then turn to step b3; If no, this user of record namely increases by a line item for the authorization message of this database table in grade autonomous access control system table of then being expert at, and is used for the row of recording user on database table and authorizes side-play amount;
B3. in the database table of this subscriber authorisation, revise the value of authorizing every trade level access control right to be listed as, this user of value representation of amended row level access control right row can be to the database manipulation of this row execution in this table.
3, the autonomous access control method of database list row level data according to claim 1 is characterized in that:
Described step C specifically comprises:
C1. judge that whether this user is the founder of tables of data, if so, then successfully returns;
C2. judge whether this user has the access rights of this table, if having, then continue step c3, if do not have, then this user's access failure;
C3. by whether comprising row level access control right row in the decision data table, judge whether this table opens the access control of row level, if do not open, showing does not need to go a grade autonomous access control inspection, and the user has access rights, and flow process finishes; If open, then continue step c4;
C4. search the side-play amount of database user in this tables of data from the autonomous access control system table of row level, if there is not user's offset information, show that then the user haves no right this table is conducted interviews, flow process finishes, and the user accesses failure; If user's offset information is arranged, then by user's the authority information of table side-play amount consumer positioning on this table, judge thus whether the user has relevant row level access control right.
CNB2007101003558A 2007-06-08 2007-06-08 Autonomous access control method for row-level data of database table Active CN100498792C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2007101003558A CN100498792C (en) 2007-06-08 2007-06-08 Autonomous access control method for row-level data of database table

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2007101003558A CN100498792C (en) 2007-06-08 2007-06-08 Autonomous access control method for row-level data of database table

Publications (2)

Publication Number Publication Date
CN101075254A true CN101075254A (en) 2007-11-21
CN100498792C CN100498792C (en) 2009-06-10

Family

ID=38976307

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2007101003558A Active CN100498792C (en) 2007-06-08 2007-06-08 Autonomous access control method for row-level data of database table

Country Status (1)

Country Link
CN (1) CN100498792C (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467416A (en) * 2010-11-05 2012-05-23 中科正阳信息安全技术有限公司 Visit control object granularity test framework and method
CN102521385A (en) * 2011-12-21 2012-06-27 北京人大金仓信息技术股份有限公司 Method for setting forced access control on database system graph
CN103065100A (en) * 2012-12-26 2013-04-24 中国人民解放军总参谋部第六十一研究所 Container-based method of users to protect private data
US8515948B2 (en) 2011-03-09 2013-08-20 International Business Machines Corporation Managing materialized query tables (MQTS) over fine-grained access control (FGAC) protected tables
CN107292188A (en) * 2016-04-12 2017-10-24 北京明略软件系统有限公司 A kind of method and apparatus for controlling access privilege
CN107392560A (en) * 2016-05-16 2017-11-24 杨国成 A kind of Excel list datas issue acquisition method and system based on internet
CN107944288A (en) * 2016-10-12 2018-04-20 北京京东尚科信息技术有限公司 A kind of data access control method and device
CN108475288A (en) * 2016-02-19 2018-08-31 华为技术有限公司 A kind of system of federated database unified access control, method and apparatus
CN109032459A (en) * 2017-07-16 2018-12-18 成都牵牛草信息技术有限公司 A kind of form data operating right authorization method
CN109086418A (en) * 2017-08-07 2018-12-25 成都牵牛草信息技术有限公司 The method that statistics list operation permission is authorized respectively based on train value
CN109995706A (en) * 2017-12-29 2019-07-09 中移(杭州)信息技术有限公司 A kind of method, apparatus of security audit, electronic equipment and storage medium
CN110096892A (en) * 2019-04-29 2019-08-06 武汉中锐源信息技术开发有限公司 Database Properties access control method and system
CN110533477A (en) * 2019-09-03 2019-12-03 互动创想(厦门)数字科技有限公司 A kind of intelligent analysis method and system based on big data
CN110717153A (en) * 2019-09-30 2020-01-21 新华三大数据技术有限公司 Authority verification method and device
CN110909369A (en) * 2019-11-08 2020-03-24 拉货宝网络科技有限责任公司 Data authority control method based on report platform
US20200143068A1 (en) * 2017-07-11 2020-05-07 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing field value of form field by means of third party field
US20200250333A1 (en) * 2019-02-04 2020-08-06 Hitachi, Ltd. Data management system and data management method
CN110046205B (en) * 2019-04-22 2021-04-09 瀚高基础软件股份有限公司 Relational database row security access control method and system
CN113656827A (en) * 2021-07-19 2021-11-16 中共四川省委组织部 Method for realizing row-level authority control based on domestic database
CN115174128A (en) * 2021-03-19 2022-10-11 北京金山云网络技术有限公司 Login management method and device and private cloud control server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB9402935D0 (en) * 1994-02-16 1994-04-06 British Telecomm A method for controlling access to a database
WO2003030032A2 (en) * 2001-09-28 2003-04-10 Oracle International Corporation An index structure to access hierarchical data in a relational database system
US7240046B2 (en) * 2002-09-04 2007-07-03 International Business Machines Corporation Row-level security in a relational database management system

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102467416B (en) * 2010-11-05 2014-05-14 中科信息安全共性技术国家工程研究中心有限公司 Visit control object granularity test framework and method
CN102467416A (en) * 2010-11-05 2012-05-23 中科正阳信息安全技术有限公司 Visit control object granularity test framework and method
US8515948B2 (en) 2011-03-09 2013-08-20 International Business Machines Corporation Managing materialized query tables (MQTS) over fine-grained access control (FGAC) protected tables
CN102521385A (en) * 2011-12-21 2012-06-27 北京人大金仓信息技术股份有限公司 Method for setting forced access control on database system graph
CN102521385B (en) * 2011-12-21 2015-06-03 北京人大金仓信息技术股份有限公司 Method for setting forced access control on database system graph
CN103065100A (en) * 2012-12-26 2013-04-24 中国人民解放军总参谋部第六十一研究所 Container-based method of users to protect private data
CN103065100B (en) * 2012-12-26 2015-07-22 中国人民解放军总参谋部第六十一研究所 Container-based method of users to protect private data
CN108475288A (en) * 2016-02-19 2018-08-31 华为技术有限公司 A kind of system of federated database unified access control, method and apparatus
CN108475288B (en) * 2016-02-19 2022-03-29 华为技术有限公司 System, method and equipment for unified access control of combined database
CN107292188A (en) * 2016-04-12 2017-10-24 北京明略软件系统有限公司 A kind of method and apparatus for controlling access privilege
CN107392560A (en) * 2016-05-16 2017-11-24 杨国成 A kind of Excel list datas issue acquisition method and system based on internet
CN107944288A (en) * 2016-10-12 2018-04-20 北京京东尚科信息技术有限公司 A kind of data access control method and device
US11775687B2 (en) * 2017-07-11 2023-10-03 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing field value of form field by means of third party field
US20200143068A1 (en) * 2017-07-11 2020-05-07 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing field value of form field by means of third party field
CN109032459A (en) * 2017-07-16 2018-12-18 成都牵牛草信息技术有限公司 A kind of form data operating right authorization method
WO2019015539A1 (en) * 2017-07-16 2019-01-24 成都牵牛草信息技术有限公司 Method for authorizing form data operation authority
US11599656B2 (en) 2017-07-16 2023-03-07 Chengdu Qianniucao Information Technology Co., Ltd. Method for authorizing form data operation authority
CN109032459B (en) * 2017-07-16 2022-01-25 成都牵牛草信息技术有限公司 Form data operation authority authorization method
CN109086418A (en) * 2017-08-07 2018-12-25 成都牵牛草信息技术有限公司 The method that statistics list operation permission is authorized respectively based on train value
CN109995706A (en) * 2017-12-29 2019-07-09 中移(杭州)信息技术有限公司 A kind of method, apparatus of security audit, electronic equipment and storage medium
US20200250333A1 (en) * 2019-02-04 2020-08-06 Hitachi, Ltd. Data management system and data management method
CN110046205B (en) * 2019-04-22 2021-04-09 瀚高基础软件股份有限公司 Relational database row security access control method and system
CN110096892A (en) * 2019-04-29 2019-08-06 武汉中锐源信息技术开发有限公司 Database Properties access control method and system
CN110533477A (en) * 2019-09-03 2019-12-03 互动创想(厦门)数字科技有限公司 A kind of intelligent analysis method and system based on big data
CN110717153B (en) * 2019-09-30 2021-08-24 新华三大数据技术有限公司 Authority verification method and device
CN110717153A (en) * 2019-09-30 2020-01-21 新华三大数据技术有限公司 Authority verification method and device
CN110909369A (en) * 2019-11-08 2020-03-24 拉货宝网络科技有限责任公司 Data authority control method based on report platform
CN115174128A (en) * 2021-03-19 2022-10-11 北京金山云网络技术有限公司 Login management method and device and private cloud control server
CN113656827A (en) * 2021-07-19 2021-11-16 中共四川省委组织部 Method for realizing row-level authority control based on domestic database

Also Published As

Publication number Publication date
CN100498792C (en) 2009-06-10

Similar Documents

Publication Publication Date Title
CN101075254A (en) Autonomous access control method for row-level data of database table
RU2373571C2 (en) Systems and methods for control realised by means of access at level of minor structural units over data stored in relational databases
US8010561B2 (en) Techniques for sharing persistently stored query results between multiple users
US8682912B2 (en) Providing secure access to data with user defined table functions
US9870483B2 (en) Row-level security in a relational database management system
US7711750B1 (en) Systems and methods that specify row level database security
US8938781B1 (en) Systems and methods for managing user permissions
US20170161514A1 (en) Query conditions-based security
Ferrari Access control in data management systems
US9455990B2 (en) System and method for role based access control in a content management system
KR101120814B1 (en) Systems and methods that optimize row level database security
CN101448002B (en) Method and device for accessing digital resources
US20090094193A1 (en) Secure normal forms
US20160125189A1 (en) Row level security
CN1295636C (en) An efficient index structure to access hierarchical data in a relational database system
CN101847155A (en) Comprise the XML Database Management System of visiting shielded XML data
CN1585325A (en) Zoned based security administration for data items
JP2010533915A (en) SECURITY SYSTEM USING DATA MASKING AND ITS DATA SECURITY METHOD
US20120284303A1 (en) Providing Access To Data With User Defined Table Functions
US20060230041A1 (en) System and method for database access control
US11372859B2 (en) Efficiently supporting value style access of MOBs stored in SQL LOB column by providing value based semantics for LOBs in RDBMS
US20050102271A1 (en) Indexes with embedded data
US20050154779A1 (en) Apparatus and method for using data filters to deliver personalized data from a shared document
CN1707496A (en) Knowledge management method and system based on activity
CN101052944A (en) Systems and methods for fine grained access control of data stored in relational databases

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100036 Beijing city Haidian District Fuchengmen Road, building 17 Yuhui

Patentee after: Beijing Shenzhou Aerospace Software Technology Co.,Ltd.

Address before: 100036 Beijing city Haidian District Fuchengmen Road, building 17 Yuhui

Patentee before: BEIJING SHENZHOU AEROSPACE SOFTWARE TECHNOLOGY Co.,Ltd.