Securing big graph databases: an overview of existing access control techniques.
Basmah Al-ZahraniAsma CherifSuhair AlshehriAbdessamad IminePublished in: Int. J. Intell. Inf. Database Syst. (2024)
Keyphrases
- access control
- graph databases
- identity management
- dynamic access control
- graph mining
- security policies
- graph model
- application domains
- regular expressions
- structured data
- role based access control
- index structure
- pattern mining
- access control policies
- access control models
- similarity search
- query language
- mining algorithm
- greedy algorithm
- xml databases
- protein structure
- information security
- access control mechanism
- database systems
- data mining
- database
- random walk