ACM SIGMOD Anthology TODS dblp.uni-trier.de

A Transformational Grammar-Based Query Processor for Access Control in a Planning System.

Robert H. Bonczek, James I. Cash, Andrew B. Whinston: A Transformational Grammar-Based Query Processor for Access Control in a Planning System. ACM Trans. Database Syst. 2(4): 326-338(1977)
@article{DBLP:journals/tods/BonczekCW77,
  author    = {Robert H. Bonczek and
               James I. Cash and
               Andrew B. Whinston},
  title     = {A Transformational Grammar-Based Query Processor for Access Control
               in a Planning System},
  journal   = {ACM Trans. Database Syst.},
  volume    = {2},
  number    = {4},
  year      = {1977},
  pages     = {326-338},
  ee        = {http://doi.acm.org/10.1145/320576.320582, db/journals/tods/BonczekCW77.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

Providing computer facilities and data availability to larger numbers of users generates increased system vulnerability which is partially offset by software security systems. Much too often these systems are presented as ad hoc additions to the basic data management system. One very important constituent of software security systems is the access control mechanism which may be the last resource available to prohibit unauthorized data retrieval. This paper presents a specification for an access control mechanism. The mechanism is specified in a context for use with the GPLAN decision support system by a theoretical description consistent with the formal definition of GPLAN's query language. Incorporation of the mechanism into the language guarantees it will not be an ad hoc addition. Furthermore, it provides a facile introduction of data security dictates into the language processor.

Copyright © 1977 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

References

[1]
...
[2]
...
[3]
...
[4]
...
[5]
James I. Cash, Andrew B. Whinston, William D. Haseman: Security for the GPLAN system. Inf. Syst. 2(2): 41-48(1976) BibTeX
[6]
...
[7]
Richard W. Conway, William L. Maxwell, Howard L. Morgan: On the Implementation of Security Measures in Information Systems. Commun. ACM 15(4): 211-220(1972) BibTeX
[8]
...
[9]
Dorothy E. Denning: A Lattice Model of Secure Information Flow. Commun. ACM 19(5): 236-243(1976) BibTeX
[10]
Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman: An Authorization Model for a Shared Data Base. SIGMOD Conference 1975: 23-31 BibTeX
[11]
...
[12]
...
[13]
H. Rex Hartson, David K. Hsiao: A Semantic Model for Data Base Protection Languages. VLDB 1976: 27-42 BibTeX
[14]
...
[15]
...
[16]
...
[17]
...
[18]
...
[19]
...
[20]
...
[21]
...
[22]
...
[23]
James H. Morris Jr.: Protection in Programming Languages. Commun. ACM 16(1): 15-21(1973) BibTeX
[24]
...
[25]
Jerome H. Saltzer: Protection and the Control of Information Sharing in Multics. Commun. ACM 17(7): 388-402(1974) BibTeX
[26]
...
[27]
...

Referenced by

  1. Frank Manola, Alain Pirotte: CQLF - A Query Language for CODASYL-Type Databases. SIGMOD Conference 1982: 94-103
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:37 2008