Diesel: applying privilege separation to database access
Citations
8 citations
3 citations
Cites background from "Diesel: applying privilege separati..."
...Diesel [39] x x CLAMP [43] x Nemesis [36] x Oracle [13] x x Postgres [23] x x SafeD...
[...]
..., by duplicating all the modules for each connected user), they also acknowledge that their solution would not scale [39] and suggest using database access control in conjunction....
[...]
...Previous work has largely ignored the view update problem by assuming that any table on which a security policy is defined contains the user id, thus joins are not required to map a user to rows in the table [36, 39, 43]....
[...]
...These solutions restrict each application user to a portion of the database [39, 43, 36]....
[...]
...Diesel [39] implements module-based access control, whereby an application is broken into a series of code...
[...]
3 citations
2 citations
2 citations
Cites methods from "Diesel: applying privilege separati..."
...applied to build several tools and frameworks for modern web apps [78, 110, 142, 143, 161]....
[...]
References
2,063 citations
606 citations
590 citations
535 citations
"Diesel: applying privilege separati..." refers background in this paper
...Operating systems Asbestos [30] and HiStar [32] are operating systems designed according to the principle of least privilege....
[...]