FIELD: information technology.
SUBSTANCE: computer-implemented data security system, having a memory device storing computer-executed components which include: a definition component for defining cell level security attributes for cells of a data table, having rows and columns, wherein cell level security attributes for a cell located in a row, having one or more other cells, and in a column, having one or more other cells, may be defined to block access to data of that cell, but grant access to data of other cells in that row and data of other cells in that column; a storage component for storing cell level security attributes as security metadata, and a security component for applying the security metadata to results of a query from a user to return filtered results based on said user, and a processor for executing said computer-executed components stored in memory.
EFFECT: providing selective restriction of access to data.
20 cl, 10 dwg
Title | Year | Author | Number |
---|---|---|---|
DETECTABILITY AND LISTING MECHANISM IN HIERARCHICALLY PROTECTED DATA STORAGE SYSTEM | 2006 |
|
RU2408070C2 |
METHOD, SYSTEM AND COMPUTER DEVICE FOR PROVIDING COMMUNICATION SERVICES BETWEEN RESOURCES IN COMMUNICATION NETWORKS AND INTERNET TO PERFORM TRANSACTIONS | 2002 |
|
RU2273107C2 |
CONSTRUCTING QUERIES FOR EXECUTION OVER MULTI-DIMENSIONAL DATA STRUCTURES | 2014 |
|
RU2679977C1 |
SAFETY IN APPLICATIONS OF EQUIVALENT NODES SYNCHRONISATION | 2006 |
|
RU2421799C2 |
METHOD, SYSTEM AND DEVICE FOR OPENING WORKBOOK REGIONS AS DATA SOURCE | 2005 |
|
RU2406147C2 |
SYSTEM AND METHOD FOR TARGET INSTALLATION OF CONFIGURED SOFTWARE | 2012 |
|
RU2523113C1 |
SPLIT DOWNLOAD FOR ELECTRONIC SOFTWARE DOWNLOAD | 2006 |
|
RU2424552C2 |
METHOD AND SYSTEM FOR CARRYING OUT TRANSACTIONS IN NETWORK USING NETWORK IDENTIFIERS | 2003 |
|
RU2376635C2 |
MANAGING USER ACCESS TO OBJECTS | 2007 |
|
RU2430413C2 |
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS | 2020 |
|
RU2807463C2 |
Authors
Dates
2013-12-10—Published
2009-04-13—Filed