Synergistic Authorization in Database Systems.
Naftaly H. Minsky:
Synergistic Authorization in Database Systems.
VLDB 1981: 543-552@inproceedings{DBLP:conf/vldb/Minsky81,
author = {Naftaly H. Minsky},
title = {Synergistic Authorization in Database Systems},
booktitle = {Very Large Data Bases, 7th International Conference, September
9-11, 1981, Cannes, France, Proceedings},
publisher = {IEEE Computer Society},
year = {1981},
pages = {543-552},
ee = {db/conf/vldb/Minsky81.html},
crossref = {DBLP:conf/vldb/81},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Abstract
We say that an authorization scheme exhibits synergistic
effects if it allowes for the power provided by the union
of two privileges to be larger than the union of the
powers of the individual privileges. This phenomenon
where the whole is larger than the sum of its parts is
shown to be essential for the support of some important
classes of authorization policies, and useful for the
optimization of the enforcement of authorization-based
rules. An authorization scheme which exhibits synergistic
effects is introduced and some of its applications are
discussed.*
Copyright © 1981 by The Institute of
Electrical and Electronic Engineers, Inc. (IEEE).
Abstract used with permission.
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
Printed Edition
Very Large Data Bases, 7th International Conference, September 9-11, 1981, Cannes, France, Proceedings.
IEEE Computer Society 1981
Contents
References
- [GRIFFITHS and WADE 1976]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)
- [JONES et al, 1976]
- Anita K. Jones, Richard J. Lipton, Lawrence Snyder:
A Linear Time Algorithm for Deciding Security.
FOCS 1976: 33-41
- [LINDEN 1976]
- Theodore A. Linden:
Operating System Structures to Support Security and Reliable Software.
ACM Comput. Surv. 8(4): 409-445(1976)
- [LOCKMAN 1981]
- Abe Lockman, Naftaly H. Minsky:
Unidirectional Transport of Rights and Take-Grant Control.
IEEE Trans. Software Eng. 8(6): 597-604(1982)
- [MINSKY 1974]
- Naftaly H. Minsky:
On Interaction with Data Bases.
SIGMOD Workshop, Vol. 1 1974: 51-62
- [MINSKY 1977]
- ...
- [MINSKY 1978]
- ...
- [MINSKY 1978]
- ...
- [MINSKY 1981]
- ...
- [STONEBRAKER 1975]
- Michael Stonebraker:
Implementation of Integrity Constraints and Views by Query Modification.
SIGMOD Conference 1975: 65-78
Copyright © Tue Mar 16 02:21:56 2010
by Michael Ley (ley@uni-trier.de)