This HTML5 document contains 47 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n20http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://localhost/temp/predkladatel/
n13http://purl.org/net/nknouf/ns/bibtex#
n14http://linked.opendata.cz/resource/domain/vavai/projekt/
n9http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n19http://linked.opendata.cz/ontology/domain/vavai/
n11https://schema.org/
n4http://linked.opendata.cz/resource/domain/vavai/zamer/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n18http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216208%3A11320%2F08%3A10084062%21RIV11-MSM-11320___/
n10http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n17http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n8http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216208%3A11320%2F08%3A10084062%21RIV11-MSM-11320___
rdf:type
skos:Concept n19:Vysledek
dcterms:description
Three-tiered information systems often use application-level authentication and authorization schemes. In these architectures, successful attacks to the application server layer offer the attacker unlimited access to the database. The proposed solution to this problem is based on a set of views employing session-scope data to determine the effective user rights. These views are generated from formal description of user and group access rights rules using a XSLT-based generator. In this system, an attacker would see only empty views even in the case he gained full access to the application server. Such a system was successfully implemented and deployed to a large DataPile system with more than 50,000 users with different access rights. Three-tiered information systems often use application-level authentication and authorization schemes. In these architectures, successful attacks to the application server layer offer the attacker unlimited access to the database. The proposed solution to this problem is based on a set of views employing session-scope data to determine the effective user rights. These views are generated from formal description of user and group access rights rules using a XSLT-based generator. In this system, an attacker would see only empty views even in the case he gained full access to the application server. Such a system was successfully implemented and deployed to a large DataPile system with more than 50,000 users with different access rights.
dcterms:title
Fine Grained Access Rights Definition in a Three Tiered Information System Fine Grained Access Rights Definition in a Three Tiered Information System
skos:prefLabel
Fine Grained Access Rights Definition in a Three Tiered Information System Fine Grained Access Rights Definition in a Three Tiered Information System
skos:notation
RIV/00216208:11320/08:10084062!RIV11-MSM-11320___
n3:aktivita
n12:P n12:Z
n3:aktivity
P(1ET100300419), Z(MSM0021620838)
n3:dodaniDat
n8:2011
n3:domaciTvurceVysledku
n9:7313136 n9:8570426 n9:3100707
n3:druhVysledku
n21:D
n3:duvernostUdaju
n16:S
n3:entitaPredkladatele
n18:predkladatel
n3:idSjednocenehoVysledku
368054
n3:idVysledku
RIV/00216208:11320/08:10084062
n3:jazykVysledku
n7:eng
n3:klicovaSlova
relational databases; authentication; authorisation; XML
n3:klicoveSlovo
n10:authentication n10:relational%20databases n10:authorisation n10:XML
n3:kontrolniKodProRIV
[E50B2EF2EE99]
n3:mistoKonaniAkce
Al Ain, U ARAB EMIRATES
n3:mistoVydani
Los Alamitos, California
n3:nazevZdroje
5th International Conference on Innovations in Information Technology
n3:obor
n17:JC
n3:pocetDomacichTvurcuVysledku
3
n3:pocetTvurcuVysledku
3
n3:projekt
n14:1ET100300419
n3:rokUplatneniVysledku
n8:2008
n3:tvurceVysledku
Bednárek, David Yaghob, Jakub Zavoral, Filip
n3:typAkce
n20:WRD
n3:wos
000274017600081
n3:zahajeniAkce
2008-12-16+01:00
n3:zamer
n4:MSM0021620838
s:numberOfPages
5
n13:hasPublisher
IEEE Communication Society
n11:isbn
978-1-4244-3396-4
n22:organizacniJednotka
11320