ACM SIGMOD Anthology TODS dblp.uni-trier.de

A Taxonomy for Secure Object-Oriented Databases.

Martin S. Olivier, Sebastiaan H. von Solms: A Taxonomy for Secure Object-Oriented Databases. ACM Trans. Database Syst. 19(1): 3-46(1994)
@article{DBLP:journals/tods/OliverS94,
  author    = {Martin S. Olivier and
               Sebastiaan H. von Solms},
  title     = {A Taxonomy for Secure Object-Oriented Databases},
  journal   = {ACM Trans. Database Syst.},
  volume    = {19},
  number    = {1},
  year      = {1994},
  pages     = {3-46},
  ee        = {http://doi.acm.org/10.1145/174638.174640, db/journals/tods/OliverS94.html},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
BibTeX

Abstract

This paper proposes a taxonomy for secure object-oriented databases in order to clarify the issues in modeling and implementing such databases. It also indicates some implications of the various choices one may make when designing such a database.

Most secure database models have been designed for relational databases. The object-oriented database model is more complex than the relational model. For these reasons, models for secure object-oriented databases are more complex than their relational counterparts. Furthermore, since views of the object-oriented model differ, each security model has to make some assumptions about the object-oriented model used for its particular database.

A number of models for secure object-oriented databases have been proposed. These models differ in many respects, because they focus on different aspects of the security problem, or because they make different assumptions about what constitutes a secure database or because they make different assumptions about the object-oriented model.

The taxonomy proposed in this paper may be used to compare the various models: Models that focus on specific issues may be positioned in the broader context with the aid of the taxonomy. The taxonomy also identifies the major aspects where security models may differ and indicates some alternatives available to the system designer for each such design choice. We show some implications of using specific alternatives.

Since differences between models for secure object-oriented databases are often subtle, a formal notation is necessary for a proper comparison. Such a formal notation also facilitates the formal derivation of restrictions that apply under specific conditions. The formal approach also gives a clear indication about the assumptions made by us - given as axioms - and the consequences of those assumptions (and of design choices made by the model designer) - given as theorems.

Copyright © 1994 by the ACM, Inc., used by permission. Permission to make digital or hard copies is granted provided that copies are not made or distributed for profit or direct commercial advantage, and that copies show this notice on the first page or initial screen of a display along with the full citation.


Joint ACM SIGMOD / IEEE Computer Society Anthology

CDROM Version: Load the CDROM "Volume 3 Issue 2, TODS 1991-1995, TKDE 1989-1992" and ... DVD Version: Load ACM SIGMOD Anthology DVD 2" and ... BibTeX

Online Edition: ACM Digital Library

[Abstract, Index Terms and Review]
[Full Text in PDF Format, 2976 KB]

References

[Bell and LaPadula 1976]
...
[Boshoff 1989]
...
[Boshoff and von Solms 1990]
...
[Boshoff and von Solms 1989]
...
[Goldberg and Robson 1983]
Adele Goldberg, David Robson: Smalltalk-80: The Language and Its Implementation. Addison-Wesley 1983
BibTeX
[Hailpern and Ossher 1990]
Brent Hailpern, Harold Ossher: Extending Objects to Support Multiple Interfaces and Access Control. IEEE Trans. Software Eng. 16(11): 1247-1257(1990) BibTeX
[Keefe and Tsai 1990]
Thomas F. Keefe, Wei-Tek Tsai: Prototyping the SODA Model. DBSec 1989: 211-235 BibTeX
[Keefe et al. 1989]
...
[Kim and Lochovsky 1989]
Won Kim, Frederick H. Lochovsky (Eds.): Object-Oriented Concepts, Databases, and Applications. ACM Press and Addison-Wesley 1989, ISBN 0-201-14410-7
Contents BibTeX
[Lunt 1990]
Teresa F. Lunt: Multilevel Security for Object-Oriented Database Systems. DBSec 1989: 199-209 BibTeX
[Lunt and Millen 1989]
...
[Lunt et al. 1990]
Teresa F. Lunt, Dorothy E. Denning, Roger R. Schell, Mark Heckman, William R. Shockley: The SeaView Security Model. IEEE Trans. Software Eng. 16(6): 593-607(1990) BibTeX
[Minsky and Rozenshtein 1987]
Naftaly H. Minsky, David Rozenshtein: A Law-Based Approach to Object-Oriented Programming. OOPSLA 1987: 482-493 BibTeX
[Mizuno and Oldehoeft 1990]
...
[Olivier 1991]
...
[Olivier and von Solms 1992a]
...
[Olivier and von Solms 1992b]
...
[Olivier and von Solms 1992c]
...
[Pfleeger 1989]
...
[Sandhu 1990]
...
[Shilling and Sweeney 1989]
John J. Shilling, Peter F. Sweeney: Three Steps to Views: Extending the Object-Oriented Paradigm. OOPSLA 1989: 353-361 BibTeX
[Smith 1988]
...
[Spooner and Landwehr 1990]
...
[Thuraisingham 1989]
Bhavani M. Thuraisingham: Mandatory Security in Object-Oriented Database Systems. OOPSLA 1989: 203-210 BibTeX
[Varadharajan and Black 1991]
...
[Wegner 1990]
...
BibTeX
ACM SIGMOD Anthology - DBLP: [Home | Search: Author, Title | Conferences | Journals]
TODS, ACM SIGMOD Anthology: Copyright © by ACM (info@acm.org), Corrections: anthology@acm.org
DBLP: Copyright © by Michael Ley (ley@uni-trier.de), last change: Tue Jun 24 18:39:15 2008