PROPAGATION OF IDENTITY AND EXECUTION OF AUTHORIZATION RULES FOR EFFECTIVE INFORMATION SYSTEMS’ DATA ACCESS CONTROL
Full Text:
PDF (Português (Brasil))Abstract
Information security is a critical issue for organizations and comprises several perspectives, including information systems development and data repositories accessed by those systems. In current distributed information systems architectures, information security involves identity propagation and data access authorization issues. This work describes the design and implementation of a simple, yet not trivial, architecture for effectively assuring information security, based on a series of standard technologies.
Keywords
segurança em banco de dados; propagação de identidade; injeção de dependência; controle de acesso a dados; regras de autorização; benchmark TPC-H