Validating and implementing security patterns for database applications Academic Article uri icon


  • Abstract. Security in general and database protection from unauthorized access in particular, are crucial to organizations. Security and authorization patterns encapsulate accumulated knowledge and best practices in this area. Correct application of security and authorization patterns will ensure effective access control to the database. For example, the Role-Based Access Control (RBAC) security pattern describes a general solution regarding who is authorized to access specific resources and which access privileges they have, based on …

publication date

  • January 1, 2009