Role Authentication for Secure DBMS.
Dugyu RyooSeonho KimMoonseog JunPublished in: Security and Management (2005)
Keyphrases
- user authentication
- authentication scheme
- authentication protocol
- security mechanisms
- security analysis
- authentication mechanism
- database management systems
- security requirements
- identity management
- integrity verification
- database
- password authentication
- secure manner
- data encryption
- secure communication
- key distribution
- databases
- database systems
- key management
- factor authentication
- smart card
- security issues
- security services
- identity authentication
- data model
- query processing
- lightweight
- access control
- data processing
- relational dbms
- management system
- key exchange protocol
- encryption decryption
- security protocols