A Semantic Model for Data Base Protection Languages.
H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42@inproceedings{DBLP:conf/vldb/HartsonH76,
author = {H. Rex Hartson and
David K. Hsiao},
editor = {Peter C. Lockemann and
Erich J. Neuhold},
title = {A Semantic Model for Data Base Protection Languages},
booktitle = {Systems for Large Data Bases, September 8-10, 1976, Brussels,
Belgium},
publisher = {North Holland {\&} IFIP},
year = {1976},
isbn = {0-7204-0546-7},
pages = {27-42},
ee = {db/conf/vldb/HartsonH76.html},
crossref = {DBLP:conf/vldb/76},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
The authorization process in a protection system is the process which translates
and stores specifications of all protection requirements. In giving recognition
to the authorization process, this work develops a model of access control to provide a semantic base for constructs of protection languages at many levels of
sophistication, accommodating a wide range of protection policies. The concepts
of "authorizer" and "ownership" are used for validation of authorizations in the
model. The basic sets of the model are presented. Subsets of states are defined
by restrictions on resource values, described by Boolean expressions known as
conditions. The most important use of conditions is as access conditions, which
allow each access decision to depend on information related to the user,to
resources, to data content, to access history, and to the general state of the
system. A GENERAL class of users is defined to establish an overall minimum level
of access rights without an explicit representation for each and every user. The
enforcement process is described and illustrated by an example.
Copyright © 1976 by International
Federation for Information Processing (IFIP).
CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...
BibTeX
Printed Edition
Peter C. Lockemann, Erich J. Neuhold (Eds.):
Systems for Large Data Bases, September 8-10, 1976, Brussels, Belgium.
North Holland & IFIP 1976, ISBN 0-7204-0546-7
Contents BibTeX
References
- [ASTRM74]
- Morton M. Astrahan, Donald D. Chamberlin:
Implementation of a Structured English Query Language.
Commun. ACM 18(10): 580-588(1975) BibTeX
- [BARRD67]
- ...
- [BAUMR75]
- ...
- [BOYCR75]
- Raymond F. Boyce, Donald D. Chamberlin, W. Frank King III, Michael Hammer:
Specifying Queries as Relational Expressions: The SQUARE Data Sublanguage.
Commun. ACM 18(11): 621-628(1975) BibTeX
- [BRAND73]
- ...
- [CODDE70]
- E. F. Codd:
A Relational Model of Data for Large Shared Data Banks.
Commun. ACM 13(6): 377-387(1970) BibTeX
- [CONWR72]
- Richard W. Conway, William L. Maxwell, Howard L. Morgan:
On the Implementation of Security Measures in Information Systems.
Commun. ACM 15(4): 211-220(1972) BibTeX
- [DENND76]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [DENNJ66]
- ...
- [DENNJ72]
- ...
- [FRIET70]
- ...
- [GRAHG72]
- ...
- [GRIFP76]
- Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
- [HANSM71]
- ...
- [HARTH75]
- ...
- [HARTH76]
- ...
- [HOFFL69]
- Lance J. Hoffman:
Computers and Privacy: A Survey.
ACM Comput. Surv. 1(2): 85-103(1969) BibTeX
- [HSIAD68]
- ...
- [JONEA73]
- ...
- [LAMPB71]
- ...
- [SALTJ75]
- ...
- [WULFW74]
- William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, Fred J. Pollack:
HYDRA: The Kernel of a Multiprocessor Operating System.
Commun. ACM 17(6): 337-345(1974) BibTeX
Referenced by
- Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin:
MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management.
ACM Trans. Database Syst. 8(3): 382-409(1983)
- Zbigniew Michalewicz:
Statistical Databases: Their Model, Query Language and Security.
SSDBM 1983: 391-402
- David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick:
Privacy and Security of Data Communications and Data Bases.
VLDB 1978: 55-67
- Robert H. Bonczek, James I. Cash, Andrew B. Whinston:
A Transformational Grammar-Based Query Processor for Access Control in a Planning System.
ACM Trans. Database Syst. 2(4): 326-338(1977)
- Deborah Downs, Gerald J. Popek:
A Kernel Design for a Secure Data Base Management System.
VLDB 1977: 507-514
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings 1976:Copyright © by IFIP,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:44:55 2009