A Database Security Access Control Method Based on Identity Authentication.
Jiwei LiXuewei DingYuchen JiangYongqi AiZhen JiaXinyi ZhangPublished in: AISNS (2023)
Keyphrases
- control method
- database security
- identity authentication
- access control
- data protection
- data security
- data integrity
- control algorithm
- control strategy
- control system
- database design
- mobile commerce
- database
- manufacturing systems
- data centric
- oracle database
- sql server
- sensitive data
- databases
- data mining
- object oriented
- data management
- data privacy
- intrusion detection
- network security
- database management
- information management