Transparent IO access control for application-level tenant isolation.
Majid MakkiDimitri Van LanduytBert LagaisseWouter JoosenNick HofstedePublished in: SAC (2018)
Keyphrases
- application level
- access control
- network management
- security policies
- operating system
- fine grained
- quality of service
- data security
- dynamic access control
- database server
- overlay network
- virtual machine
- security model
- security mechanisms
- access control policies
- access control models
- database security
- access control mechanism
- rbac model
- databases
- role based access control
- security requirements
- access control systems
- response time
- database systems