Protecting deductive databases from unauthorized retrieval and update requests

  • Authors:
  • Steve Barker

  • Affiliations:
  • Department of Computer Science, King's College, London, WC2R 2LS, UK

  • Venue:
  • Data & Knowledge Engineering - Data and applications security
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

We show how deductive databases may be protected against unauthorized retrieval and update requests issued by authenticated users. To achieve this protection, a deductive database is expressed in a form that guarantees that only authorized access requests are permitted. Authorized retrieval and update requests are specified by using an access control theory that is expressed in normal clause logic. The approach has a number of attractive technical results associated with it, can be efficiently implemented, and can be used to protect the information in any normal deductive database.