A Semantic Model for Data Base Protection Languages.
H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42@inproceedings{DBLP:conf/vldb/HartsonH76,
author = {H. Rex Hartson and
David K. Hsiao},
editor = {Peter C. Lockemann and
Erich J. Neuhold},
title = {A Semantic Model for Data Base Protection Languages},
booktitle = {Systems for Large Data Bases, September 8-10, 1976, Brussels,
Belgium},
publisher = {North Holland {\&} IFIP},
year = {1976},
isbn = {0-7204-0546-7},
pages = {27-42},
ee = {db/conf/vldb/HartsonH76.html},
crossref = {DBLP:conf/vldb/76},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
The authorization process in a protection system is the process which translates
and stores specifications of all protection requirements. In giving recognition
to the authorization process, this work develops a model of access control to provide a semantic base for constructs of protection languages at many levels of
sophistication, accommodating a wide range of protection policies. The concepts
of "authorizer" and "ownership" are used for validation of authorizations in the
model. The basic sets of the model are presented. Subsets of states are defined
by restrictions on resource values, described by Boolean expressions known as
conditions. The most important use of conditions is as access conditions, which
allow each access decision to depend on information related to the user,to
resources, to data content, to access history, and to the general state of the
system. A GENERAL class of users is defined to establish an overall minimum level
of access rights without an explicit representation for each and every user. The
enforcement process is described and illustrated by an example.
Copyright © 1976 by International
Federation for Information Processing (IFIP).
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
Peter C. Lockemann, Erich J. Neuhold (Eds.):
Systems for Large Data Bases, September 8-10, 1976, Brussels, Belgium.
North Holland & IFIP 1976, ISBN 0-7204-0546-7
Contents
References
- [ASTRM74]
- Morton M. Astrahan, Donald D. Chamberlin:
Implementation of a Structured English Query Language.
Commun. ACM 18(10): 580-588(1975)
- [BARRD67]
- ...
- [BAUMR75]
- ...
- [BOYCR75]
- Raymond F. Boyce, Donald D. Chamberlin, W. Frank King III, Michael Hammer:
Specifying Queries as Relational Expressions: The SQUARE Data Sublanguage.
Commun. ACM 18(11): 621-628(1975)
- [BRAND73]
- ...
- [CODDE70]
- E. F. Codd:
A Relational Model of Data for Large Shared Data Banks.
Commun. ACM 13(6): 377-387(1970)
- [CONWR72]
- Richard W. Conway, William L. Maxwell, Howard L. Morgan:
On the Implementation of Security Measures in Information Systems.
Commun. ACM 15(4): 211-220(1972)
- [DENND76]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976)
- [DENNJ66]
- ...
- [DENNJ72]
- ...
- [FRIET70]
- ...
- [GRAHG72]
- ...
- [GRIFP76]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)
- [HANSM71]
- ...
- [HARTH75]
- ...
- [HARTH76]
- ...
- [HOFFL69]
- Lance J. Hoffman:
Computers and Privacy: A Survey.
ACM Comput. Surv. 1(2): 85-103(1969)
- [HSIAD68]
- ...
- [JONEA73]
- ...
- [LAMPB71]
- ...
- [SALTJ75]
- ...
- [WULFW74]
- William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, Fred J. Pollack:
HYDRA: The Kernel of a Multiprocessor Operating System.
Commun. ACM 17(6): 337-345(1974)
Copyright © Tue Mar 16 02:21:54 2010
by Michael Ley (ley@uni-trier.de)