Foundations of logic programming; (2nd extended ed.)
Foundations of logic programming; (2nd extended ed.)
Principles of database and knowledge-base systems, Vol. I
Principles of database and knowledge-base systems, Vol. I
The well-founded semantics for general logic programs
Journal of the ACM (JACM)
Database security
Tabled evaluation with delaying for general logic programs
Journal of the ACM (JACM)
Belief reasoning in MLS deductive databases
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
An introduction to database systems (7th ed.)
An introduction to database systems (7th ed.)
The NIST model for role-based access control: towards a unified standard
RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
Foundations of Secure Deductive Databases
IEEE Transactions on Knowledge and Data Engineering
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
A Modal Logical Framework for Security Policies
ISMIS '97 Proceedings of the 10th International Symposium on Foundations of Intelligent Systems
TRBAC: A Temporal Authorization Model
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Data Protection by Logic Programming
CL '00 Proceedings of the First International Conference on Computational Logic
Logic and Databases: A 20 Year Retrospective
LID '96 Proceedings of the International Workshop on Logic in Databases
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Protecting deductive databases from unauthorized retrieval and update requests
Data & Knowledge Engineering - Data and applications security
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Formal specification and validation of security policies
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Hi-index | 0.00 |
We show how logic programs may be used to protect deductive databases from the unauthorized retrieval of positive and negative information, and from unauthorized insert and delete requests. To achieve this protection, a deductive database is expressed in a form that is guaranteed to permit only authorized access requests to be performed. The protection of the positive information that may be retrieved from a database and the information that may be inserted are treated in a uniform way as is the protection of the negative information in the database, and the information that may be deleted.