A Comprehensive Study of Risk-Adaptive Access Control in Advanced Database Management Systems

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2026 | Volume : 13 | 01 | Page :
    By

    Manas Kumar Yogi,

  1. Assistant Professor, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India

Abstract

The current control methods for accession of a crucial resource often struggle to provide adequate security in dynamic and complex advanced database management systems (DBMS). These static models lack the flexibility to adapt to evolving threats and contextual changes, leaving potential vulnerabilities. Risk-Adaptive Access Control (RadAC) emerges as a sophisticated solution, integrating real-time risk assessment into authorization decisions to dynamically adjust access permissions. This review article provides a comprehensive study of RadAC in advanced DBMS, exploring its theoretical foundations, architectural components, and practical applications. We delve into the methodologies for risk quantification, the role of contextual factors, and the integration of machine learning techniques for enhanced adaptability. We have also analyzed the challenges associated with RadAC implementation, including performance overhead, complexity, and the need for transparent policy enforcement. By synthesizing recent scholarly work from past five years, this article aims to offer a holistic understanding of RadAC, highlighting its potential to significantly enhance data security and compliance in modern database environments, while also identifying future research directions and emerging trends.

Keywords: Risk, Access, Database, Cyber threat, Attack, Advanced Database Management Systems

How to cite this article:
Manas Kumar Yogi. A Comprehensive Study of Risk-Adaptive Access Control in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-.
How to cite this URL:
Manas Kumar Yogi. A Comprehensive Study of Risk-Adaptive Access Control in Advanced Database Management Systems. Journal of Advanced Database Management & Systems. 2026; 13(01):-. Available from: https://journals.stmjournals.com/joadms/article=2026/view=241163


References

  1. Atlam HF, Azad MA, Alassafi MO, Alshdadi AA, Alenezi A. Risk-based access control model: A systematic literature review. Future Internet. 2020 Jun 11;12(6):103.
  2. Atlam HF, Yang Y. Enhancing Healthcare Security: A Unified RBAC and ABAC Risk-Aware Access Control Approach. Future Internet. 2025 Jun 14;17(6):262.
  3. Calvo M, Beltrán M. A model for risk-based adaptive security controls. Computers & Security. 2022 Apr 1;115:102612.
  4. Dohare I, Singh K, Mohan Y. Fuzzy Logic-Based Energy-Efficient Trust Evaluation Scheme in Sensor Assisted Industry 4.0. InSmart Materials Engineering: Data-Driven Approaches and Multiscale Modelling 2026 Jan 2 (pp. 103-124). Cham: Springer Nature Switzerland.
  5. Farhadighalati N, Estrada-Jimenez LA, Nikghadam-Hojjati S, Barata J. A systematic review of access control models: Background, existing research, and challenges. IEEE Access. 2025 Jan 23.
  6. Fleming C, Kundu A, Kompella R. Uncertainty-Aware, Risk-Adaptive Access Control for Agentic Systems using an LLM-Judged TBAC Model. arXiv preprint arXiv:2510.11414. 2025 Oct 13.
  7. Hu VC, Hu VC. Access control on NoSQL databases. US Department of Commerce, National Institute of Standards and Technology; 2024 May 7.
  8. Kumar P. Next-generation secure authentication and access control architectures: advanced techniques for securing distributed systems in modern enterprises. International Journal of Computational and Experimental Science and Engineering. 2025 Jul;11(3):4966-95.
  9. Ugbaja US, Nwabekee US, Owobu WO, Abieba OA. Conceptual framework for role-based network access management to minimize unauthorized data exposure across IT environments. International Journal of Social Science Exceptional Research. 2023 Jan;2(1):211-21.
  10. Pu X, Jiang R, Song Z, Liang Z, Yang L. A medical big data access control model based on smart contracts and risk in the blockchain environment. Frontiers in Public Health. 2024 Mar 28;12:1358184.
  11. Ross R, Pillitteri V, Graubart R, Bodeau D, McQuaid R. Developing cyber resilient systems: a systems security engineering approach. National Institute of Standards and Technology; 2019 Sep 4.
  12. Saura JR, Škare V, Dosen DO. Is AI-based digital marketing ethical? Assessing a new data privacy paradox. Journal of Innovation & Knowledge. 2024 Oct 1;9(4):100597.
  13. Sifaoui A, Eastin MS, Wilcox GB, Doorey AM. Privacy, Artificial Intelligence, and Vulnerable Children on Social Media. The Darker Side of Social Media: Consumer Psychology and Mental Health. 2024 Jun 7.
  14. Soni V. AI and the Personalization-Privacy Paradox: Balancing Customized Marketing with Consumer Data Protection. International Journal of Computer Trends and Technology. 2024 Sep;72(9):24-31.
  15. Wahab AW, Idris MY. Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment. Computers, Materials & Continua. 2024 Sep 1;80(3).
  16. Wang R, Li C, Zhang K, Tu B. Zero-trust based dynamic access control for cloud computing. Cybersecurity. 2025 Feb 16;8(1):12.
  17. Vishwakarma RK, Pandey A, Kundnani MP, Yadav AK, Singh MN, Yadav MS. Personalization vs. privacy: Marketing strategies in the digital age. Journal of Marketing & Social Research. 2025 Jul 13;2:177-91.
  18. Ying S, Huang Y, Qian L, Song J. Privacy paradox for location tracking in mobile social networking apps: The perspectives of behavioral reasoning and regulatory focus. Technological Forecasting and Social Change. 2023 May 1;190:122412.
  19. Zahedi SM, Fan S, Lee BC. Managing heterogeneous datacenters with tokens. ACM Transactions on Architecture and Code Optimization (TACO). 2018 May 23;15(2):1-23.
  20. Ziv T, Whiteman JD, Sommerville JA. Toddlers’ interventions toward fair and unfair individuals. Cognition. 2021 Sep 1;214:104781.

Ahead of Print Subscription Review Article
Volume 13
01
Received 16/01/2026
Accepted 29/01/2026
Published 28/04/2026
Publication Time 102 Days


Login


My IP

PlumX Metrics