PROPAGATION OF IDENTITY AND EXECUTION OF AUTHORIZATION RULES FOR EFFECTIVE INFORMATION SYSTEMS’ DATA ACCESS CONTROL

Felipe Leão, Sergio Puntar, Leonardo Guerreiro Azevedo, Fernanda Baião, Claudia Cappelli
DOI: https://doi.org/10.5329/RESI.2012.1101009

Abstract

Information security is a critical issue for organizations and comprises several perspectives, including information systems development and data repositories accessed by those systems. In current distributed information systems architectures, information security involves identity propagation and data access authorization issues. This work describes the design and implementation of a simple, yet not trivial, architecture for effectively assuring information security, based on a series of standard technologies.

Keywords

segurança em banco de dados; propagação de identidade; injeção de dependência; controle de acesso a dados; regras de autorização; benchmark TPC-H


Compartilhe