Protection and the control of information sharing in multics
Communications of the ACM
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
An architecture for high-level language database extensions
SIGMOD '76 Proceedings of the 1976 ACM SIGMOD international conference on Management of data
SEQUEL: A structured English query language
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |
A case is made for the use of compile-time actions to reduce the overhead incurred when comprehensive authorization and integrity features are incorporated in a shared database system. A model of authorization and integrity evaluation is discussed as well as the performance, sensitivity and system security aspects of early binding for database access and control. A problem incurred with this early binding is the sensitivity of the compiled programs to changes in the physical structure of the database or changes in the authorization rules or integrity constraints. Also, more security problems exist because of the need to protect the results of compile-time checking. A system architecture is proposed to decrease sensitivity and to improve security. The degree of improvement and some performance/sensitivity tradeoffs are analyzed.