LEADER 00783nam0-22002891i-450- 001 990007492830403321 005 20050513122423.0 035 $a000749283 035 $aFED01000749283 035 $a(Aleph)000749283FED01 035 $a000749283 100 $a20030814d1957----km-y0itay50------ba 101 0 $afre 102 $aFR 200 1 $a<>Océans$fJules Rouch 210 $aParis$cColin$dc 1957 215 $a216 p.$cill.$d18 cm 225 1 $aCollection Armand Colin$iSection de physique$v320 610 0 $aOceani 700 1$aRouch,$bJules Alfred Pierre$f<1884-1973>$0270807 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990007492830403321 952 $aB-05-080$bIst.6322$fILFGE 959 $aILFGE 996 $aOcéans$936649 997 $aUNINA LEADER 02432aam 2200457I 450 001 9910711180303321 005 20151105023937.0 024 8 $aGOVPUB-C13-3600a1985f02eda40f04598d25956032 035 $a(CKB)5470000002480205 035 $a(OCoLC)927737190 035 $a(EXLCZ)995470000002480205 100 $a20151105d1993 ua 0 101 0 $aeng 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aSecurity issues in the database language SQL /$fW. Timothy Polk, Lawrence E. Bassham, III 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d1993. 215 $a1 online resource 225 1 $aNIST special publication ;$v800-8 300 $a1993. 300 $aContributed record: Metadata reviewed, not verified. Some fields updated by batch processes. 300 $aTitle from PDF title page. 300 $aWithdrawn. 320 $aIncludes bibliographical references. 330 3 $aThe Database Language SQL (SQL) is a standard interface for accessing and manipulating relational databases. An SQL-compliant database management system (DBMS) will include a minimum level of functionality in a variety of areas. However, many additional areas are left unspecified by the SQL standard. In addition, there are multiple versions of the SQL standard; the functionality will vary according to the particular version. This document examines the security functionality that might be required of relational DBMS's, and compares them with the requirements and options of the SQL specifications. The comparison will show that the security functionality of an SQL-compliant DBMS may vary greatly. A variety of security policies are considered which can be supported by SQL. The document ends by showing which types of functions are required by the examined security policies. 610 $aComputer security 610 $aDBMS 610 $aRelational database management system 610 $aSQL 700 $aPolk$b W. Timothy$01410280 701 $aBassham$b Lawrence E$01388740 701 $aPolk$b W. Timothy$01410280 712 02$aNational Institute of Standards and Technology (U.S.).$bComputer Security Division. 801 0$bNBS 801 1$bNBS 801 2$bGPO 906 $aBOOK 912 $a9910711180303321 996 $aSecurity issues in the database language SQL$93498622 997 $aUNINA