Practical UNIX security
Multilevel security issues in distributed database management systems—III
Computers and Security
Information organization using Rufus
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Database security
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Sharing manufacturing information in virtual enterprises
Communications of the ACM
Security and software engineering
Practical reusable UNIX software
Lore: a database management system for semistructured data
ACM SIGMOD Record
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Authorization specification and enforcement in federated database systems
Journal of Computer Security
The Conceptual Basis for Mediation Services
IEEE Expert: Intelligent Systems and Their Applications
DataGuides: Enabling Query Formulation and Optimization in Semistructured Databases
VLDB '97 Proceedings of the 23rd International Conference on Very Large Data Bases
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Object Fusion in Mediator Systems
VLDB '96 Proceedings of the 22th International Conference on Very Large Data Bases
OOER '95 Proceedings of the 14th International Conference on Object-Oriented and Entity-Relationship Modelling
An agent and RBAC model to secure cooperative information systems
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
With the emergence of the Internet, collaborative computing has become more feasible than ever. Organizations can share valuable information among each other. However, certain users should only access certain portions of source data. The CHAOS (Configurable Heterogeneous Active Object System) project addresses security issues that arise when information is shared among collaborating enterprises. It provides a framework for integrating security policy specification with source data maintenance. In CHAOS, security policies are incorporated into the data objects as active nodes to form active objects. When active objects are queried, their active nodes are dynamically loaded by the active security mediator and executed. The active nodes, based on the security policy incorporated, can locate and operate on all the elements within the active object, modifying the content as well as the structure of the object. A set of API's is provided to construct more complex security policies, which can be tailored for different enterprise settings. This model moves the responsibility of security to the source data provider, rather than through a central authority. The design provides enterprises with a flexible mechanism to protect sensitive information in a collaborative computing environment.