Proceedings of the 23rd European Conference on Pattern Languages of Programs 2018
DOI: 10.1145/3282308.3282321
|View full text |Cite
|
Sign up to set email alerts
|

A Security Pattern for Key-Value NoSQL Database Authorization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In Accumulo, data is stored in a distributed sorted map . The keys are logically divided into a row key to uniquely identify the row, a column and an automatically generated timestamp used for versioning (Moreno et al , 2018). Each column is further divided into a family (i.e.…”
Section: Key-value Databasesmentioning
confidence: 99%
See 1 more Smart Citation
“…In Accumulo, data is stored in a distributed sorted map . The keys are logically divided into a row key to uniquely identify the row, a column and an automatically generated timestamp used for versioning (Moreno et al , 2018). Each column is further divided into a family (i.e.…”
Section: Key-value Databasesmentioning
confidence: 99%
“…Moreno et al (2018) proposed a model to describe who can access the values of specific data cells in a key-value database system. The labels may define rules for access matrix, RBAC or multilevel models.…”
Section: Key-value Databasesmentioning
confidence: 99%
“…Moreover, we combine risk modeling with goal modeling, taking advantage of the benefits of Goal-Oriented Requirements Engineering. Moreno et al (2018) propose a requirements engineering framework for Big Data, with a special focus on security requirements. Their work aims at providing methodological support to link new data nodes to the existing Big Data cloud.…”
Section: Related Workmentioning
confidence: 99%