Access Control in Databases
Silberschatz, A., Korth, H. F., & Sudarshan, S. (2020).
Database System Concepts (7th ed.). McGraw-Hill Education.
(Chapter 26: Security and Access Control)
Covers fundamental database security and access control mechanisms.Elmasri, R., & Navathe, S. B. (2016).
Fundamentals of Database Systems (7th ed.). Pearson.
(Chapter 30: Database Security and Authorization)
Provides detailed concepts on database authorization and access control.Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996).
Role-Based Access Control Models. IEEE Computer, 29(2), 38–47.
Defines standard RBAC models widely used in database systems.Ferraiolo, D. F., & Kuhn, D. R. (1992).
Role-Based Access Control
Proceedings of the 15th National Computer Security Conference.
Foundational work introducing RBAC.Bell, D. E., & LaPadula, L. J. (1973).
Secure Computer System: Unified Exposition and Multics Interpretation
MITRE Corporation.
Introduces Mandatory Access Control (MAC).