PERMISSION RESTRICTION METHOD AND ALGORITHM IN DISTRIBUTED DATABASE

dc.contributor.authorSadikov Sh.M.
dc.date.accessioned2025-12-28T20:18:52Z
dc.date.issued2023-08-20
dc.description.abstractThe article analyzes the distributed database architecture, permission management methods, existing threats and vulnerabilities in the distributed database, features of permission restriction and their application in the distributed database, Role-based access control and Attribute-based access control methods. an enhanced, distributed resolution constraint algorithm is developed.
dc.formatapplication/pdf
dc.identifier.urihttps://sjird.journalspark.org/index.php/sjird/article/view/771
dc.identifier.urihttps://asianeducationindex.com/handle/123456789/13619
dc.language.isoeng
dc.publisherJournals Park Publishing
dc.relationhttps://sjird.journalspark.org/index.php/sjird/article/view/771/739
dc.sourceSpectrum Journal of Innovation, Reforms and Development; Vol. 18 (2023); 29-36
dc.source2751-1731
dc.subjectdistributed database, replication, access control, auditing and monitoring, rolebased access control (RBAC), ABAC model, encryption, users, resources, roles, permissions, distributed access restriction.
dc.titlePERMISSION RESTRICTION METHOD AND ALGORITHM IN DISTRIBUTED DATABASE
dc.typeinfo:eu-repo/semantics/article
dc.typeinfo:eu-repo/semantics/publishedVersion
dc.typePeer-reviewed Article

item.page.files

item.page.filesection.original.bundle

pagination.showing.labelpagination.showing.detail
loading.default
thumbnail.default.alt
item.page.filesection.name
shm_2023_permission_restriction_method_and_algori.pdf
item.page.filesection.size
335.74 KB
item.page.filesection.format
Adobe Portable Document Format

item.page.collections