Vinti Doshi

  • Citations Per Year
Learn More
Security administration is harder in databases that have multiple tiers of derived data, such as federations, warehouses, or systems with many views. Metadata (e.g., security requirements) expressed at each tier must be visible and understood at the other tier. We describe several use cases in which tiers negotiate to reconcile their business requirements.(More)
1 This work was funded by the MITRE technology program under project number 51MSR871. Abstract Many electronic commerce applications including those developed for business-to-consumer (B2C) and business-to-business (B2B) uses, require operations in computing environments that are truly distributed. That is, users can request data access from multiple(More)
  • 1