Access Control in Databases

  • Silberschatz, A., Korth, H. F., & Sudarshan, S. (2020).
    Database System Concepts (7th ed.). McGraw-Hill Education.
    (Chapter 26: Security and Access Control)
    Covers fundamental database security and access control mechanisms.

  • Elmasri, R., & Navathe, S. B. (2016).
    Fundamentals of Database Systems (7th ed.). Pearson.
    (Chapter 30: Database Security and Authorization)
    Provides detailed concepts on database authorization and access control.

  • Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996).
    Role-Based Access Control Models. IEEE Computer, 29(2), 38–47.
    Defines standard RBAC models widely used in database systems.

  • Ferraiolo, D. F., & Kuhn, D. R. (1992).
    Role-Based Access Control
    Proceedings of the 15th National Computer Security Conference.
    Foundational work introducing RBAC.

  • Bell, D. E., & LaPadula, L. J. (1973).
    Secure Computer System: Unified Exposition and Multics Interpretation
    MITRE Corporation.
    Introduces Mandatory Access Control (MAC).