An introduction to database systems: vol. I (4th ed.)
An introduction to database systems: vol. I (4th ed.)
System R: relational approach to database management
ACM Transactions on Database Systems (TODS)
A relational model of data for large shared data banks
Communications of the ACM
SEQUEL: A structured English query language
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS
PRIMARY ACCESS CONTROL IN LARGE-SCALE TIME-SHARED DECISION SYSTEMS
Protection in programmed systems.
Protection in programmed systems.
Selective and locally controlled transport of privileges
ACM Transactions on Programming Languages and Systems (TOPLAS) - Lecture notes in computer science Vol. 174
ACM Transactions on Information Systems (TOIS)
Chickens and eggs—the interrelationship of systems and theory
PODS '87 Proceedings of the sixth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
Office-by-example: an integrated office system and database manager
ACM Transactions on Information Systems (TOIS)
Extensible query processing in starburst
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
IEEE Transactions on Software Engineering
Derived data update in semantic databases
VLDB '89 Proceedings of the 15th international conference on Very large data bases
Federated database systems for managing distributed, heterogeneous, and autonomous databases
ACM Computing Surveys (CSUR) - Special issue on heterogeneous databases
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Toward a multilevel secure relational data model
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
ACM SIGMOD Record - Directions for future database research & development
Authorizations in relational database management systems
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
High assurance discretionary access control for object bases
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Propagation of authorizations in distributed database systems
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A non-timestamped authorization model for data management systems
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Access control for large collections
ACM Transactions on Information Systems (TOIS)
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
System R: an architectural overview
IBM Systems Journal
The uses of role hierarchies in access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Ensuring integrity by adding obligations to privileges
ICSE '85 Proceedings of the 8th international conference on Software engineering
Determining View dependencies using tableaux
ACM Transactions on Database Systems (TODS)
Theseus—a programming language for relational databeses
ACM Transactions on Database Systems (TODS)
Retrospection on a database system
ACM Transactions on Database Systems (TODS)
ACM Transactions on Database Systems (TODS)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Database Reorganization—Principles and Practice
ACM Computing Surveys (CSUR)
Query Optimization in Database Systems
ACM Computing Surveys (CSUR)
Relational database: a practical foundation for productivity
Communications of the ACM
A history and evaluation of System R
Communications of the ACM
Proceedings of the 10th international conference on World Wide Web
Journal on Educational Resources in Computing (JERIC)
Reminiscences in influential papers
ACM SIGMOD Record
A study on the protection of statistical data bases
SIGMOD '77 Proceedings of the 1977 ACM SIGMOD international conference on Management of data
The cedar DBMS: a preliminary report
SIGMOD '81 Proceedings of the 1981 ACM SIGMOD international conference on Management of data
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
Framework for the Security Component of an Ada DBMS
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
Administration and Autonomy in a Replication-Transparent Distributed DBMS
VLDB '88 Proceedings of the 14th International Conference on Very Large Data Bases
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
CHAOS: An Active Security Mediation System
CAiSE '00 Proceedings of the 12th International Conference on Advanced Information Systems Engineering
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Data Protection by Logic Programming
CL '00 Proceedings of the First International Conference on Computational Logic
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
A database approach for managing VLSI design data
DAC '82 Proceedings of the 19th Design Automation Conference
Specification of content-dependent security policies
ACM '83 Proceedings of the 1983 annual conference on Computers : Extending the human resource
Efficient damage assessment and repair in resilient distributed database systems
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
A fine-grained, controllable, user-to-user delegation method in RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Integration and Efficient Lookup of Compressed XML Accessibility Maps
IEEE Transactions on Knowledge and Data Engineering
Delegation in the role graph model
Proceedings of the eleventh ACM symposium on Access control models and technologies
On the efficiency of checking perfect privacy
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
A security model for full-text file system search in multi-user environments
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Fine-grained access control to web databases
Proceedings of the 12th ACM symposium on Access control models and technologies
Relational database: a practical foundation for productivity
ACM Turing award lectures
Protection of information in relational data bases
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
A Kernel design for a secure data base management system
VLDB '77 Proceedings of the third international conference on Very large data bases - Volume 3
Privacy and security of data communications and data bases
VLDB '78 Proceedings of the fourth international conference on Very Large Data Bases - Volume 4
Decentralized authorization in a database system
VLDB '79 Proceedings of the fifth international conference on Very Large Data Bases - Volume 5
Application of sub-predicate tests in database systems
VLDB '79 Proceedings of the fifth international conference on Very Large Data Bases - Volume 5
A history of system R and SQL/data system
VLDB '81 Proceedings of the seventh international conference on Very Large Data Bases - Volume 7
A database approach to modelling and managing security information
VLDB '81 Proceedings of the seventh international conference on Very Large Data Bases - Volume 7
Synergistic authorization in database systems
VLDB '81 Proceedings of the seventh international conference on Very Large Data Bases - Volume 7
Processing conjunctive predicates and queries
VLDB '80 Proceedings of the sixth international conference on Very Large Data Bases - Volume 6
A semantic model for data base protection languages
VLDB '76 Proceedings of the second international conference on Systems for Large Data Bases
Compressed accessibility map: efficient access control for XML
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Improving multi-tier security using redundant authentication
Proceedings of the 2007 ACM workshop on Computer security architecture
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Enabling policy-based access control in BI applications
Data & Knowledge Engineering
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
A Robust Sampling-Based Framework for Privacy Preserving OLAP
DaWaK '08 Proceedings of the 10th international conference on Data Warehousing and Knowledge Discovery
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Spatial Domains for the Administration of Location-based Access Control Policies
Journal of Network and Systems Management
A Model for Sharing of Confidential Provenance Information in a Query Based System
Provenance and Annotation of Data and Processes
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Data base security: requirements, policies, and models
IBM Systems Journal
System R: an architectural overview
IBM Systems Journal
IBM Journal of Research and Development
Preserving SQL access control policies over published XML data
Proceedings of the 2009 EDBT/ICDT Workshops
Practical protection for personal storage in the cloud
Proceedings of the Third European Workshop on System Security
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Access control policy translation and verification within heterogeneous data federations
Proceedings of the 15th ACM symposium on Access control models and technologies
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
View-based access control with high assurance
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Supporting multiple access control policies in database systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Views as the security objects in a multilevel secure relational database management system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
Journal of Computer and System Sciences
ACM Transactions on Information and System Security (TISSEC)
Creating objects in the flexible authorization framework
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Access control in geographic databases
CoMoGIS'06 Proceedings of the 2006 international conference on Advances in Conceptual Modeling: theory and practice
Defining and measuring policy coverage in testing access control policies
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Protecting personal data with various granularities: a logic-based access control approach
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Extending SQL to allow the active usage of purposes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Revocation of obligation and authorisation policy objects
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Secure model management operations for the web
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Data protection in distributed database systems
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
Access rights – the keys to cooperative work/learning
MIS'04 Proceedings of the 2004 international conference on Metainformatics
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
OSDM: an organizational supervised delegation model for RBAC
ISC'12 Proceedings of the 15th international conference on Information Security
Policy administration in tag-based authorization
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.04 |
A multiuser database system must selectively permit users to share data, while retaining the ability to restrict data access. There must be a mechanism to provide protection and security, permitting information to be accessed only by properly authorized users. Further, when tables or restricted views of tables are created and destroyed dynamically, the granting, authentication, and revocation of authorization to use them must also be dynamic. Each of these issues and their solutions in the context of the relational database management system System R are discussed.When a database user creates a table, he is fully and solely authorized to perform upon it actions such as read, insert, update, and delete. He may explicitly grant to any other user any or all of his privileges on the table. In addition he may specify that that user is authorized to further grant these privileges to still other users. The result is a directed graph of granted privileges originating from the table creator.At some later time a user A may revoke some or all of the privileges which he previously granted to another user B. This action usually revokes the entire subgraph of the grants originating from A's grant to B. It may be, however, that B will still possess the revoked privileges by means of a grant from another user C, and therefore some or all of B's grants should not be revoked. This problem is discussed in detail, and an algorithm for detecting exactly which of B's grants should be revoked is presented.