Towards Security-Aware Microservices: On Extracting Endpoint Data Access Operations to Determine Access Rights.
Amr S. AbdelfattahMicah SchieweJacob CurtisTomás CernýEunjee SongPublished in: CLOSER (2023)
Keyphrases
- data access
- access control systems
- data management
- security policies
- access control
- data sharing
- database applications
- access rights
- write operations
- role based access control
- data objects
- access control policies
- data security
- data intensive
- information security
- intrusion detection
- visual basic
- access control models
- security issues
- data storage
- network security
- sql server
- object oriented
- security requirements
- security mechanisms
- database
- database security
- fine grained
- wireless sensor networks
- data model