A lattice model of secure information flow
Communications of the ACM
Protection and the control of information sharing in multics
Communications of the ACM
On the implementation of security measures in information systems
Communications of the ACM
Protection in programming languages
Communications of the ACM
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
The Theory of Parsing, Translation, and Compiling
The Theory of Parsing, Translation, and Compiling
A Semantic Model for Data Base Protection Languages
Systems for Large Data Bases
Full protection specifications in the semantic model for database protection languages
ACM '76 Proceedings of the 1976 annual conference
Secure information flow in computer systems.
Secure information flow in computer systems.
ACM SIGMIS Database - Proceedings of a conference on Decision Support Systems, Santa Clara, California, January 24-26, 1977
Formal languages and their relation to automata
Formal languages and their relation to automata
ACM Computing Surveys (CSUR)
CQLF---a query language for CODASYL-type databases
SIGMOD '82 Proceedings of the 1982 ACM SIGMOD international conference on Management of data
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |
Providing computer facilities and data availability to larger numbers of users generates increased system vulnerability which is partially offset by software security systems. Much too often these systems are presented as ad hoc additions to the basic data management system. One very important constituent of software security systems is the access control mechanism which may be the last resource available to prohibit unauthorized data retrieval. This paper presents a specification for an access control mechanism. The mechanism is specified in a context for use with the GPLAN decision support system by a theoretical description consistent with the formal definition of GPLAN's query language. Incorporation of the mechanism into the language guarantees it will not be an ad hoc addition. Furthermore, it provides a facile introduction of data security dictates into the language processor.