dblp.uni-trier.de www.dagstuhl.de www.uni-trier.de

A Semantic Model for Data Base Protection Languages.

H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42
@inproceedings{DBLP:conf/vldb/HartsonH76,
  author    = {H. Rex Hartson and
               David K. Hsiao},
  editor    = {Peter C. Lockemann and
               Erich J. Neuhold},
  title     = {A Semantic Model for Data Base Protection Languages},
  booktitle = {Systems for Large Data Bases, September 8-10, 1976, Brussels,
               Belgium},
  publisher = {North Holland {\&} IFIP},
  year      = {1976},
  isbn      = {0-7204-0546-7},
  pages     = {27-42},
  ee        = {db/conf/vldb/HartsonH76.html},
  crossref  = {DBLP:conf/vldb/76},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

The authorization process in a protection system is the process which translates and stores specifications of all protection requirements. In giving recognition to the authorization process, this work develops a model of access control to provide a semantic base for constructs of protection languages at many levels of sophistication, accommodating a wide range of protection policies. The concepts of "authorizer" and "ownership" are used for validation of authorizations in the model. The basic sets of the model are presented. Subsets of states are defined by restrictions on resource values, described by Boolean expressions known as conditions. The most important use of conditions is as access conditions, which allow each access decision to depend on information related to the user,to resources, to data content, to access history, and to the general state of the system. A GENERAL class of users is defined to establish an overall minimum level of access rights without an explicit representation for each and every user. The enforcement process is described and illustrated by an example.

Copyright © 1976 by International Federation for Information Processing (IFIP).


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...

Printed Edition

Peter C. Lockemann, Erich J. Neuhold (Eds.): Systems for Large Data Bases, September 8-10, 1976, Brussels, Belgium. North Holland & IFIP 1976, ISBN 0-7204-0546-7
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

References

[ASTRM74]
Morton M. Astrahan, Donald D. Chamberlin: Implementation of a Structured English Query Language. Commun. ACM 18(10): 580-588(1975) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[BARRD67]
...
[BAUMR75]
...
[BOYCR75]
Raymond F. Boyce, Donald D. Chamberlin, W. Frank King III, Michael Hammer: Specifying Queries as Relational Expressions: The SQUARE Data Sublanguage. Commun. ACM 18(11): 621-628(1975) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[BRAND73]
...
[CODDE70]
E. F. Codd: A Relational Model of Data for Large Shared Data Banks. Commun. ACM 13(6): 377-387(1970) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[CONWR72]
Richard W. Conway, William L. Maxwell, Howard L. Morgan: On the Implementation of Security Measures in Information Systems. Commun. ACM 15(4): 211-220(1972) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[DENND76]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[DENNJ66]
...
[DENNJ72]
...
[FRIET70]
...
[GRAHG72]
...
[GRIFP76]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[HANSM71]
...
[HARTH75]
...
[HARTH76]
...
[HOFFL69]
Lance J. Hoffman: Computers and Privacy: A Survey. ACM Comput. Surv. 1(2): 85-103(1969) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[HSIAD68]
...
[JONEA73]
...
[LAMPB71]
...
[SALTJ75]
...
[WULFW74]
William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, Fred J. Pollack: HYDRA: The Kernel of a Multiprocessor Operating System. Commun. ACM 17(6): 337-345(1974) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

Referenced by

  1. Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983)
  2. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  3. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick: Privacy and Security of Data Communications and Data Bases. VLDB 1978: 55-67
  4. Robert H. Bonczek, James I. Cash, Andrew B. Whinston: A Transformational Grammar-Based Query Processor for Access Control in a Planning System. ACM Trans. Database Syst. 2(4): 326-338(1977)
  5. Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514

Last update Fri Sep 14 17:37:56 2012 CET by the DBLP TeamThis material is Open Data Data released under the ODC-BY 1.0 license — See also our legal information page