Information Protection by Method Base Systems.
Rainer Hüber, Peter C. Lockemann:
Information Protection by Method Base Systems.
VLDB 1978: 420-426@inproceedings{DBLP:conf/vldb/HuberL78,
author = {Rainer H{\"u}ber and
Peter C. Lockemann},
editor = {S. Bing Yao},
title = {Information Protection by Method Base Systems},
booktitle = {Fourth International Conference on Very Large Data Bases, September
13-15, 1978, West Berlin, Germany},
publisher = {IEEE Computer Society},
year = {1978},
pages = {420-426},
ee = {db/conf/vldb/HuberL78.html},
crossref = {DBLP:conf/vldb/78},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
Protection of data against unauthorized access
(read or write operations) as currently practised in data base systems is too crude a measure to be effective in an environment with a
large diversity of progmms for evaluating the
data base. Too restrictive a protection prohibits the application of all but the simplest
programs, while too broad an authorization
allows wide latitude in programs but may open
up too many data to individual inspection.
The most obvious way to solve this dilemma is
for the protection to take the program within
which the data is used into consideration. It
is shown that a number of measures must
accompany this solution in order to be effective: a method base, the control of sets of
data, and a hierarchical system structure.
Some fundamental problems are outlined and
some technical solutions are proposed. In
particular, the type of facilities provided by
the data base system has an influence on the
efficiency of the protection mechanism.
Copyright © 1978 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
S. Bing Yao (Ed.):
Fourth International Conference on Very Large Data Bases, September 13-15, 1978, West Berlin, Germany.
IEEE Computer Society 1978
Contents
References
- [1]
- ...
- [2]
- ...
- [3]
- David P. Dobkin, Anita K. Jones, Richard J. Lipton:
Secure Databases: Protection Against User Influence.
ACM Trans. Database Syst. 4(1): 97-106(1979)
- [4]
- Naftaly H. Minsky:
Intentional Resolution of Privacy Protection in Database Systems.
Commun. ACM 19(3): 148-159(1976)
- [5]
- ...
- [6]
- John B. Kam, Jeffrey D. Ullman:
A Model of Statistical Databases and Their Security.
ACM Trans. Database Syst. 2(1): 1-10(1977)
- [7]
- ...
- [8]
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181
- [9]
- Francis Y. L. Chin:
Security in Statistical Databases for Queries with Small Counts.
ACM Trans. Database Syst. 3(1): 92-104(1978)
- [10]
- ...
- [11]
- James I. Cash, Andrew B. Whinston, William D. Haseman:
Security for the GPLAN system.
Inf. Syst. 2(2): 41-48(1976)
- [12]
- ...
- [13]
- Richard W. Conway, William L. Maxwell, Howard L. Morgan:
On the Implementation of Security Measures in Information Systems.
Commun. ACM 15(4): 211-220(1972)
- [14]
- ...
- [15]
- ...
- [16]
- Theodore A. Linden:
Operating System Structures to Support Security and Reliable Software.
ACM Comput. Surv. 8(4): 409-445(1976)
- [17]
- ...
- [18]
- ...
- [19]
- ...
Copyright © Tue Mar 16 02:21:55 2010
by Michael Ley (ley@uni-trier.de)