Back to Security Pattern Catalog
: Core Security
How do you control access in an environment with sensitive data so as to prevent leakage of information?
Assign classification to users and data. Separate different institutional units into categories. Enforce confidentiality and integrity by adopting security models. For example, confidentiality can be enforced by the Bell La-Padula model and integrity can be enforced by Biba's model.
Pit-bull and HP’s Virtual Vault OS. DBMS like Informix, Oracle.
Role Based Access Control
Access Control, Security Model
Last modified: May 05, 2012
and Maintained by: Munawar Hafiz