An Authorization Mechanism for a Relational Database System.
Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Database System.
ACM Trans. Database Syst. 1(3): 242-255(1976)@article{DBLP:journals/tods/GriffithsW76,
author = {Patricia P. Griffiths and
Bradford W. Wade},
title = {An Authorization Mechanism for a Relational Database System},
journal = {ACM Trans. Database Syst.},
volume = {1},
number = {3},
year = {1976},
pages = {242-255},
ee = {http://doi.acm.org/10.1145/320473.320482, db/journals/tods/GriffithsW76.html},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX
Abstract
A multiuser database system must selectively permit users to share data, while
retaining the ability to restrict data access. There must be a mechanism to provide
protection and security, permitting information to be accessed only by properly
authorized users. Further, when tables or restricted views of tables are created and
destroyed dynamically, the granting, authentication, and revocation of authorization
to use them must also be dynamic. Each of these issues and their solutions in the
context of the relational database management system System R are discussed.
When a database user creates a table, he is fully and solely authorized to perform
upon it actions such as read, insert, update, and delete. He may explicitly grant to
any other user any or all of his privileges on the table. In addition he may specify
that that user is authorized to further grant these privileges to still other users.
The result is a directed graph of granted privileges originating from the table creator.
At some later time a user A may revoke some or all of the privileges which he
previously granted to another user B. This action usually revokes the entire subgraph
of the grants originating from A's grant to B. It may be, however, that B will still
possess the revoked privileges by means of a grant from another user C, and therefore
some or all of B's grants should not be revoked. This problem is discussed in detail,
and an algorithm for detecting exactly which of B's grants should be revoked is
presented.
Copyright © 1976 by the ACM,
Inc., used by permission. Permission to make
digital or hard copies is granted provided that
copies are not made or distributed for profit or
direct commercial advantage, and that copies show
this notice on the first page or initial screen of
a display along with the full citation.
CDROM Version: Load the CDROM "Volume 3 Issue 1, TODS 1976-1990" and ...
DVD Version: Load ACM SIGMOD Anthology DVD 2" and ...
BibTeX
Conference Abstract
Patricia P. Griffiths, Bradford W. Wade:
An Authorization Mechanism for a Relational Data Base System (Abstract).
SIGMOD Conference 1976: 51 BibTeX
References
- [1]
- Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson:
System R: Relational Approach to Database Management.
ACM Trans. Database Syst. 1(2): 97-137(1976) BibTeX
- [2]
- ...
- [3]
- Donald D. Chamberlin, Raymond F. Boyce:
SEQUEL: A Structured English Query Language.
SIGMOD Workshop, Vol. 1 1974: 249-264 BibTeX
- [4]
- ...
- [5]
- E. F. Codd:
A Relational Model of Data for Large Shared Data Banks.
Commun. ACM 13(6): 377-387(1970) BibTeX
- [6]
- E. F. Codd:
A Database Sublanguage Founded on the Relational Calculus.
SIGFIDET Workshop 1971: 35-68 BibTeX
- [7]
- E. F. Codd:
Further Normalization of the Data Base Relational Model.
IBM Research Report, San Jose, California RJ909: (1971) BibTeX
- [8]
- E. F. Codd:
Relational Completeness of Data Base Sublanguages.
In: R. Rustin (ed.): Database Systems: 65-98, Prentice Hall and IBM Research Report RJ 987, San Jose, California : (1972) BibTeX
- [9]
- E. F. Codd:
Recent Investigations in Relational Data Base Systems.
IFIP Congress 1974: 1017-1021 BibTeX
- [10]
- ...
- [11]
- ...
- [12]
- ...
- [13]
- ...
- [14]
- ...
- [15]
- ...
- [16]
- ...
- [17]
- ...
- [18]
- ...
Referenced by
- Elisa Bertino:
Review - An Authorization Mechanism for a Relational Data Base System.
ACM SIGMOD Digital Review 1: (1999)
- Richard T. Snodgrass:
Reminiscences on Influential Papers.
SIGMOD Record 27(1): 54-57(1998)
- Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
An Extended Authorization Model for Relational Databases.
IEEE Trans. Knowl. Data Eng. 9(1): 85-101(1997)
- Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino:
A Unified Framework for Enforcing Multiple Access Control Policies.
SIGMOD Conference 1997: 474-485
- Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta:
A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems.
OOER 1995: 44-54
- Eduardo B. Fernández, Ehud Gudes, Haiyan Song:
A Model for Evaluation and Administration of Security in Object-Oriented Databases.
IEEE Trans. Knowl. Data Eng. 6(2): 275-292(1994)
- Dirk Jonscher, Klaus R. Dittrich:
An Approach for Building Secure Database Federations.
VLDB 1994: 24-35
- Elisa Bertino:
Data Hiding and Security in Object-Oriented Databases.
ICDE 1992: 338-347
- Rafiul Ahad, James Davis, Stefan Gower, Peter Lyngbæk, Andra Marynowski, Emmanuel Onuegbe:
Supporting Access Control in an Object-Oriented Database Language.
EDBT 1992: 184-200
- Fausto Rabitti, Elisa Bertino, Won Kim, Darrell Woelk:
A Model of Authorization for Next-Generation Database Systems.
ACM Trans. Database Syst. 16(1): 88-131(1991)
- Sushil Jajodia, Ravi S. Sandhu:
Towards a Multilevel Secure Relational Data Model.
SIGMOD Conference 1991: 50-59
- Amit P. Sheth, James A. Larson:
Federated Database Systems for Managing Distributed, Heterogeneous, and Autonomous Databases.
ACM Comput. Surv. 22(3): 183-236(1990)
- I-Min A. Chen, Dennis McLeod:
Derived Data Update in Semantic Databases.
VLDB 1989: 225-235
- Laura M. Haas, Johann Christoph Freytag, Guy M. Lohman, Hamid Pirahesh:
Extensible Query Processing in Starburst.
SIGMOD Conference 1989: 377-388
- Amihai Motro:
An Access Authorization Model for Relational Databases Based on Algebraic Manipulation of View Definitions.
ICDE 1989: 339-347
- Joachim Biskup, Hans Hermann Brüggemann:
The Personal Model of Data - Towards a Privacy Oriented Information System (Extended Abstract).
ICDE 1989: 348-355
- Jeffrey D. Ullman:
Principles of Database and Knowledge-Base Systems, Volume II.
Computer Science Press 1989, ISBN 0-7167-8162-X
Contents - Kenneth R. Abbott, Dennis R. McCarthy:
Administration and Autonomy in a Replication-Transparent Distributed DBMS.
VLDB 1988: 195-205
- Fausto Rabitti, Darrell Woelk, Won Kim:
A Model of Authorization for Object-Oriented and Semantic Databases.
EDBT 1988: 231-250
- Elisa Bertino, Laura M. Haas:
Views and Security in Distributed Database Management Systems.
EDBT 1988: 155-169
- Patricia G. Selinger:
Chickens and Eggs: The Interrelationship of Systems and Theory.
PODS 1987: 250-253
- David L. Spooner, Arthur M. Keller, Gio Wiederhold, John Salasin, Deborah Heystek:
Framework for the Security Component of an Ada DBMS.
VLDB 1986: 347-354
- Naftaly H. Minsky, David Rozenshtein, Jan Chomicki:
A Controllable Prolog Database System.
ICDE 1986: 618-628
- Fred J. Friedman, Arthur M. Keller, John Salasin, Gio Wiederhold, Murray R. Berkowitz, David L. Spooner:
Reference Model for Ada Interfaces to Database Management Systems.
ICDE 1986: 492-506
- Matthias Jarke, Jürgen Koch:
Query Optimization in Database Systems.
ACM Comput. Surv. 16(2): 111-152(1984)
- Anthony C. Klug, Rod Price:
Determining View Dependencies Using Tableaux.
ACM Trans. Database Syst. 7(3): 361-380(1982)
- Naftaly H. Minsky:
Synergistic Authorization in Database Systems.
VLDB 1981: 543-552
- Donald D. Chamberlin, A. M. Gilbert, Robert A. Yost:
A History of System R and SQL/Data System (Invited Paper).
VLDB 1981: 456-464
- U. Bussolati, Giancarlo Martella:
A Database Approach to Modelling and Managing Security Information.
VLDB 1981: 532-542
- M. R. Brown, R. G. G. Cattell, N. Suzuki:
The Cedar DBMS: A Preliminary Report.
SIGMOD Conference 1981: 205-211
- Michael Stonebraker:
Retrospection on a Database System.
ACM Trans. Database Syst. 5(2): 225-240(1980)
- Daniel J. Rosenkrantz, Harry B. Hunt III:
Processing Conjunctive Predicates and Queries.
VLDB 1980: 64-72
- Jonathan E. Shopiro:
Theseus - A Programming Language for Relational Databases.
ACM Trans. Database Syst. 4(4): 493-517(1979)
- Gary H. Sockut, Robert P. Goldberg:
Database Reorganization - Principles and Practice.
ACM Comput. Surv. 11(4): 371-395(1979)
- Won Kim:
Relational Database Systems.
ACM Comput. Surv. 11(3): 187-211(1979)
- Christopher Wood, Eduardo B. Fernández:
Decentralized Authorization in a Database System.
VLDB 1979: 352-359
- Rudolf Munz, H.-J. Schneider, Frank Steyer:
Application of Sub-Predicate Tests in Database Systems.
VLDB 1979: 426-435
- Ronald Fagin:
On an Authorization Mechanism.
ACM Trans. Database Syst. 3(3): 310-319(1978)
- David K. Hsiao, Douglas S. Kerr, Stuart E. Madnick:
Privacy and Security of Data Communications and Data Bases.
VLDB 1978: 55-67
- Deborah Downs, Gerald J. Popek:
A Kernel Design for a Secure Data Base Management System.
VLDB 1977: 507-514
- François Bancilhon, Nicolas Spyratos:
Protection of Information in Relational Data Bases.
VLDB 1977: 494-500
- Clement T. Yu, Francis Y. L. Chin:
A Study on the Protection of Statistical Data Bases.
SIGMOD Conference 1977: 169-181
- H. Rex Hartson, David K. Hsiao:
A Semantic Model for Data Base Protection Languages.
VLDB 1976: 27-42
BibTeX
ACM SIGMOD Anthology - DBLP:
[Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:38:35 2008