Learn More
The insider threat against database management systems is a very dangerous and common security problem. Authorized users may compromise database security by abusing legitimate privileges to masquerade as another user or to gather data for malicious purposes. This problem is aggravated for databases made available over the web through web applications since(More)
In a clear contrast with the phenomenal growth of Web database applications, access control issues related to data stored in the back-end databases have largely been neglected. Current approaches to access control on databases do not fit web databases because they are mostly based on individual user identities. In this paper, we propose (RBAC+), a dynamic(More)
RÉSUMÉ. Il est connu que les performances des algorithmes d'extraction des itemsets fermés laissent à désirer lorsqu'ils sont appliqués sur des contextes éparses. Aussi, dans ce papier, nous proposons une approche qui s'inscrit dans l'optique d'appliquer au type du contexte, selon sa densité (dense ou éparse), le type d'algorithme le plus approprié du point(More)
Mouse peritoneal macrophages elicited by injecting i.p. killed group C Streptococci were shown to exhibit several characteristics commonly found in inflammatory macrophages: they secreted high levels of plasminogen activator but had to be stimulated in vitro by LPS to elaborate significant amounts of lymphocyte activating factor (LAF); they contained(More)
The majority of today's web-based applications are based on back-end databases to process and store business information. Containing valuable business information, these systems are highly interesting to attackers and special care needs to be taken to prevent them from malicious accesses. In this paper, we propose (RBAC +), an extension of the NIST RBAC(More)
  • 1