A relational model of data for large shared data banks
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
A functional view of data independence
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
SEQUEL: A structured English query language
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
An approach to implementing a relational data management system
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
Secure Query-Processing Strategies
Computer
Ensuring integrity by adding obligations to privileges
ICSE '85 Proceedings of the 8th international conference on Software engineering
Retrospection on a database system
ACM Transactions on Database Systems (TODS)
The design and implementation of INGRES
ACM Transactions on Database Systems (TODS)
A Comparison of the Relational and CODASYL Approaches to Data-Base Management
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
Nonprocedural query processing for databases with access paths
SIGMOD '78 Proceedings of the 1978 ACM SIGMOD international conference on management of data
Security Constraint Processing in a Multilevel Secure Distributed Database Management System
IEEE Transactions on Knowledge and Data Engineering
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
ACM '76 Proceedings of the 1976 annual conference
Embedding a relational data sublanguage in a general purpose programming language
Proceedings of the 1976 conference on Data : Abstraction, definition and structure
OTTER - An information retrieval system for office automation
COCS '84 Proceedings of the second ACM-SIGOA conference on Office information systems
Extending Relational Database Systems to Automatically Enforce Privacy Policies
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Protecting sensitive patient data via query modification
Proceedings of the 2005 ACM symposium on Applied computing
Privacy constraint processing in a privacy-enhanced database management system
Data & Knowledge Engineering
On tracker attacks in health grids
Proceedings of the 2006 ACM symposium on Applied computing
Redundancy and information leakage in fine-grained access control
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Definition and evaluation of access rules in data management systems
VLDB '75 Proceedings of the 1st International Conference on Very Large Data Bases
Limiting disclosure in hippocratic databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
On the correctness criteria of fine-grained access control in relational databases
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Purpose based access control for privacy protection in relational database systems
The VLDB Journal — The International Journal on Very Large Data Bases
Enabling policy-based access control in BI applications
Data & Knowledge Engineering
Dynamic Meta-level Access Control in SQL
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Data base security: requirements, policies, and models
IBM Systems Journal
Fine-grained access control for database management systems
BNCOD'07 Proceedings of the 24th British national conference on Databases
Fine-grained access control for EPC information services
IOT'08 Proceedings of the 1st international conference on The internet of things
Conditional purpose based access control model for privacy protection
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Proceedings of the Fourteenth International Database Engineering & Applications Symposium
fQuery: SPARQL query rewriting to enforce data confidentiality
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Efficient inference control for open relational queries
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Inheriting access control rules from large relational databases to materialized views automatically
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part III
Rewriting of SPARQL/update queries for securing data access
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Modularisation in maude of parametrized RBAC for row level access control
ADBIS'11 Proceedings of the 15th international conference on Advances in databases and information systems
On deducibility and anonymisation in medical databases
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
FGAC-QD: fine-grained access control model based on query decomposition strategy
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Privacy-Preserving database systems
Foundations of Security Analysis and Design III
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Inference-usability confinement by maintaining inference-proof views of an information system
International Journal of Computational Science and Engineering
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
This work describes the access control system being implemented in INGRES (INteractive Graphics and REtrieval System). The scheme can be applied to any relational data base management system and has several advantages over other suggested schemes. These include: a) implementation easeb) small execution time overheadc) powerful and flexible controlsd) conceptual simplicityThe basic idea utilized is that a user interaction with the data base is modified to an alternate form which is guaranteed to have no access violations. This modification takes place in a high level interaction language. Hence, the processing of a resulting interaction can be accomplished with no further regard for protection. In particular, any procedure calls in the access paths for control purposes, such as in [1,2], are avoided.