Semantics and implementation of schema evolution in object-oriented databases
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
The NTree: a two dimension partial order for protection groups
ACM Transactions on Computer Systems (TOCS)
Data Engineering - Special issue on directions for future DBMS research and development
An authorization model for object-oriented and semantic databases
An authorization model for object-oriented and semantic databases
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Object-Oriented Database Management Systems: Concepts and Issues
Computer - Special issue on instruction sequencing
Object-oriented modeling and design
Object-oriented modeling and design
Introduction to object-oriented databases
Introduction to object-oriented databases
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Database Security and Integrity
Database Security and Integrity
The ROSE Data Manager: Using Object Technology to Support Interactive Engineering Applications
IEEE Transactions on Knowledge and Data Engineering
Object-Oriented Databases: Definition and Research Directions
IEEE Transactions on Knowledge and Data Engineering
A Model of Authorization for Object-Oriented and Semantic Databases
EDBT '88 Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology
ACM '76 Proceedings of the 1976 annual conference
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
An access control model for video database systems
Proceedings of the ninth international conference on Information and knowledge management
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
Research Frontiers in Object Technology
Information Systems Frontiers
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
Authorization and Revocation in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
An Access Control Model for Tree Data Structures
ISC '02 Proceedings of the 5th International Conference on Information Security
A hierarchical access control model for video database systems
ACM Transactions on Information Systems (TOIS)
A Logical Framework for Reasoning on Data Access Control Policies
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Access control policies and languages
International Journal of Computational Science and Engineering
Description Logic Framework for Access Control and Security in Object-Oriented Systems
RSFDGrC '07 Proceedings of the 11th International Conference on Rough Sets, Fuzzy Sets, Data Mining and Granular Computing
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Detection of access control flaws in a distributed database system with local site autonomy
IDEAS'97 Proceedings of the 1997 international conference on International database engineering and applications symposium
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Optimized workflow authorization in service oriented architectures
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Access control in an object-oriented document repository
ADBIS'97 Proceedings of the First East-European conference on Advances in Databases and Information systems
Pragmatic XML access control using off-the-shelf RDBMS
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Hi-index | 0.01 |
The integration of object-oriented programming concepts with databases is one of the most significant advances in the evolution of database systems. Many aspects of such a combination have been studied, but there are few models to provide security for this richly structured information. We develop an authorization model for object-oriented databases. This model consists of a set of policies, a structure for authorization rules, and algorithms to evaluate access requests against the authorization rules. User access policies are based on the concept of inherited authorization applied along the class structure hierarchy. We propose also a set of administrative policies that allow the control of user access and its decentralization. Finally, we study the effect of class structuring changes on authorization.