Horizontally and vertically bounded propagation of privileges
Information Processing Letters
Object oriented programming: an evolutionary approach
Object oriented programming: an evolutionary approach
Developing C++ software
Object-oriented modeling and design
Object-oriented modeling and design
Object-oriented databases
ACM Transactions on Database Systems (TODS)
Principles of Data Security
Database Security and Integrity
Database Security and Integrity
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
Research Frontiers in Object Technology
Information Systems Frontiers
OSDM: an organizational supervised delegation model for RBAC
ISC'12 Proceedings of the 15th international conference on Information Security
Hi-index | 0.00 |
Few studies of object-oriented databases deal with their security, a fundamental aspect of systems with complex data structures. Most authorization systems give users who own resources only some basic control over them; here, we provide users with more direct control over their resources by associating with each grant propagation numbers. Propagation numbers govern the grantability and exercisability of the privileges. Of particular interest in our study of authorization in an o-o environment is the combination of inheritance and granting of privileges. Diverse policies are discussed and implemented in a test-bed system.