ACM SIGMOD Anthology VLDB dblp.uni-trier.de

A Semantic Model for Data Base Protection Languages.

H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42
@inproceedings{DBLP:conf/vldb/HartsonH76,
  author    = {H. Rex Hartson and
               David K. Hsiao},
  editor    = {Peter C. Lockemann and
               Erich J. Neuhold},
  title     = {A Semantic Model for Data Base Protection Languages},
  booktitle = {Systems for Large Data Bases, September 8-10, 1976, Brussels,
               Belgium},
  publisher = {North Holland {\&} IFIP},
  year      = {1976},
  isbn      = {0-7204-0546-7},
  pages     = {27-42},
  ee        = {db/conf/vldb/HartsonH76.html},
  crossref  = {DBLP:conf/vldb/76},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

The authorization process in a protection system is the process which translates and stores specifications of all protection requirements. In giving recognition to the authorization process, this work develops a model of access control to provide a semantic base for constructs of protection languages at many levels of sophistication, accommodating a wide range of protection policies. The concepts of "authorizer" and "ownership" are used for validation of authorizations in the model. The basic sets of the model are presented. Subsets of states are defined by restrictions on resource values, described by Boolean expressions known as conditions. The most important use of conditions is as access conditions, which allow each access decision to depend on information related to the user,to resources, to data content, to access history, and to the general state of the system. A GENERAL class of users is defined to establish an overall minimum level of access rights without an explicit representation for each and every user. The enforcement process is described and illustrated by an example.

Copyright © 1976 by International Federation for Information Processing (IFIP).


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Peter C. Lockemann, Erich J. Neuhold (Eds.): Systems for Large Data Bases, September 8-10, 1976, Brussels, Belgium. North Holland & IFIP 1976, ISBN 0-7204-0546-7
Contents BibTeX

References

[ASTRM74]
Morton M. Astrahan, Donald D. Chamberlin: Implementation of a Structured English Query Language. Commun. ACM 18(10): 580-588(1975) BibTeX
[BARRD67]
...
[BAUMR75]
...
[BOYCR75]
Raymond F. Boyce, Donald D. Chamberlin, W. Frank King III, Michael Hammer: Specifying Queries as Relational Expressions: The SQUARE Data Sublanguage. Commun. ACM 18(11): 621-628(1975) BibTeX
[BRAND73]
...
[CODDE70]
E. F. Codd: A Relational Model of Data for Large Shared Data Banks. Commun. ACM 13(6): 377-387(1970) BibTeX
[CONWR72]
Richard W. Conway, William L. Maxwell, Howard L. Morgan: On the Implementation of Security Measures in Information Systems. Commun. ACM 15(4): 211-220(1972) BibTeX
[DENND76]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[DENNJ66]
...
[DENNJ72]
...
[FRIET70]
...
[GRAHG72]
...
[GRIFP76]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[HANSM71]
...
[HARTH75]
...
[HARTH76]
...
[HOFFL69]
Lance J. Hoffman: Computers and Privacy: A Survey. ACM Comput. Surv. 1(2): 85-103(1969) BibTeX
[HSIAD68]
...
[JONEA73]
...
[LAMPB71]
...
[SALTJ75]
...
[WULFW74]
William A. Wulf, Ellis S. Cohen, William M. Corwin, Anita K. Jones, Roy Levin, C. Pierson, Fred J. Pollack: HYDRA: The Kernel of a Multiprocessor Operating System. Commun. ACM 17(6): 337-345(1974) BibTeX

Referenced by

  1. Robert P. Trueblood, H. Rex Hartson, Johannes J. Martin: MULTISAFE - A Modular Multiprocessing Approach to Secure Database Management. ACM Trans. Database Syst. 8(3): 382-409(1983)
  2. Zbigniew Michalewicz: Statistical Databases: Their Model, Query Language and Security. SSDBM 1983: 391-402
  3. David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick: Privacy and Security of Data Communications and Data Bases. VLDB 1978: 55-67
  4. Robert H. Bonczek, James I. Cash, Andrew B. Whinston: A Transformational Grammar-Based Query Processor for Access Control in a Planning System. ACM Trans. Database Syst. 2(4): 326-338(1977)
  5. Deborah Downs, Gerald J. Popek: A Kernel Design for a Secure Data Base Management System. VLDB 1977: 507-514
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings 1976:Copyright © by IFIP,
ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Sat May 16 23:44:55 2009