A Transformational Grammar-Based Query Processor for Access Control in a Planning System.
Robert H. Bonczek, James I. Cash, Andrew B. Whinston:
A Transformational Grammar-Based Query Processor for Access Control in a Planning System.
ACM Trans. Database Syst. 2(4): 326-338(1977)@article{DBLP:journals/tods/BonczekCW77,
author = {Robert H. Bonczek and
James I. Cash and
Andrew B. Whinston},
title = {A Transformational Grammar-Based Query Processor for Access Control
in a Planning System},
journal = {ACM Trans. Database Syst.},
volume = {2},
number = {4},
year = {1977},
pages = {326-338},
ee = {http://doi.acm.org/10.1145/320576.320582, db/journals/tods/BonczekCW77.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
Providing computer facilities and data availability to larger numbers of users
generates increased system vulnerability which is partially offset by software
security systems. Much too often these systems are presented as ad hoc additions to
the basic data management system. One very important constituent of software security
systems is the access control mechanism which may be the last resource available to
prohibit unauthorized data retrieval. This paper presents a specification for an
access control mechanism. The mechanism is specified in a context for use with the
GPLAN decision support system by a theoretical description consistent with the formal
definition of GPLAN's query language. Incorporation of the mechanism into the language
guarantees it will not be an ad hoc addition. Furthermore, it provides a facile
introduction of data security dictates into the language processor.
Copyright © 1977 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
References
- [1]
- ...
- [2]
- ...
- [3]
- ...
- [4]
- ...
- [5]
- James I. Cash, Andrew B. Whinston, William D. Haseman:
Security for the GPLAN system.
Inf. Syst. 2(2): 41-48(1976) BibTeX
- [6]
- ...
- [7]
- Richard W. Conway, William L. Maxwell, Howard L. Morgan:
On the Implementation of Security Measures in Information Systems.
Commun. ACM 15(4): 211-220(1972) BibTeX
- [8]
- ...
- [9]
- Dorothy E. Denning:
A Lattice Model of Secure Information Flow.
Commun. ACM 19(5): 236-243(1976) BibTeX
- [10]
- Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman:
An Authorization Model for a Shared Data Base.
SIGMOD Conference 1975: 23-31 BibTeX
- [11]
- ...
- [12]
- ...
- [13]
- H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42 BibTeX
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
- [19]
- ...
- [20]
- ...
- [21]
- ...
- [22]
- ...
- [23]
- James H. Morris Jr.:
Protection in Programming Languages.
Commun. ACM 16(1): 15-21(1973) BibTeX
- [24]
- ...
- [25]
- Jerome H. Saltzer:
Protection and the Control of Information Sharing in Multics.
Commun. ACM 17(7): 388-402(1974) BibTeX
- [26]
- ...
- [27]
- ...
Referenced by
- Frank Manola, Alain Pirotte:
CQLF - A Query Language for CODASYL-Type Databases.
SIGMOD Conference 1982: 94-103
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:37 2008