Synergistic Authorization in Database Systems.

Naftaly H. Minsky: Synergistic Authorization in Database Systems. VLDB 1981: 543-552
  author    = {Naftaly H. Minsky},
  title     = {Synergistic Authorization in Database Systems},
  booktitle = {Very Large Data Bases, 7th International Conference, September
               9-11, 1981, Cannes, France, Proceedings},
  publisher = {IEEE Computer Society},
  year      = {1981},
  pages     = {543-552},
  ee        = {db/conf/vldb/Minsky81.html},
  crossref  = {DBLP:conf/vldb/81},
  bibsource = {DBLP,}


We say that an authorization scheme exhibits synergistic effects if it allowes for the power provided by the union of two privileges to be larger than the union of the powers of the individual privileges. This phenomenon where the whole is larger than the sum of its parts is shown to be essential for the support of some important classes of authorization policies, and useful for the optimization of the enforcement of authorization-based rules. An authorization scheme which exhibits synergistic effects is introduced and some of its applications are discussed.*

Copyright © 1981 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.

ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ... BibTeX

Printed Edition

Very Large Data Bases, 7th International Conference, September 9-11, 1981, Cannes, France, Proceedings. IEEE Computer Society 1981
Contents BibTeX


Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) BibTeX
[JONES et al, 1976]
Anita K. Jones, Richard J. Lipton, Lawrence Snyder: A Linear Time Algorithm for Deciding Security. FOCS 1976: 33-41 BibTeX
[LINDEN 1976]
Theodore A. Linden: Operating System Structures to Support Security and Reliable Software. ACM Comput. Surv. 8(4): 409-445(1976) BibTeX
[LOCKMAN 1981]
Abe Lockman, Naftaly H. Minsky: Unidirectional Transport of Rights and Take-Grant Control. IEEE Trans. Software Eng. 8(6): 597-604(1982) BibTeX
[MINSKY 1974]
Naftaly H. Minsky: On Interaction with Data Bases. SIGMOD Workshop, Vol. 1 1974: 51-62 BibTeX
[MINSKY 1977]
[MINSKY 1978]
[MINSKY 1978]
[MINSKY 1981]
Michael Stonebraker: Implementation of Integrity Constraints and Views by Query Modification. SIGMOD Conference 1975: 65-78 BibTeX

Referenced by

  1. Naftaly H. Minsky, David Rozenshtein, Jan Chomicki: A Controllable Prolog Database System. ICDE 1986: 618-628
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
VLDB Proceedings (1977-1981): Copyright © by IEEE,
ACM SIGMOD Anthology: Copyright © by ACM (, Corrections:
DBLP: Copyright © by Michael Ley (, last change: Sat May 16 23:45:14 2009