Data model issues for object-oriented applications
ACM Transactions on Information Systems (TOIS)
Composite object support in an object-oriented database system
OOPSLA '87 Conference proceedings on Object-oriented programming systems, languages and applications
Integrating an object-oriented programming system with a database system
OOPSLA '88 Conference proceedings on Object-oriented programming systems, languages and applications
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
Versions and change notification in an object-oriented database system
DAC '88 Proceedings of the 25th ACM/IEEE Design Automation Conference
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
An authorization model for a shared data base
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
A Guide to DB2
Database Security and Integrity
Database Security and Integrity
A Model of Authorization for Object-Oriented and Semantic Databases
EDBT '88 Proceedings of the International Conference on Extending Database Technology: Advances in Database Technology
A Unifying Framework for Version Control in a CAD Environment
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data
CACL: efficient fine-grained protection for objects
OOPSLA '92 conference proceedings on Object-oriented programming systems, languages, and applications
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Extending N-grid group authorization using compact encoding
SAC '92 Proceedings of the 1992 ACM/SIGAPP Symposium on Applied computing: technological challenges of the 1990's
Role-based security: pros, cons, & some research directions
ACM SIGSAC Review
Role-based security, object oriented databases and separation of duty
ACM SIGMOD Record
Authorizations in relational database management systems
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Formal query languages for secure relational databases
ACM Transactions on Database Systems (TODS)
Consortium: a framework for transactions in collaborative environments
CIKM '95 Proceedings of the fourth international conference on Information and knowledge management
Static detection of security flaws in object-oriented databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
A non-timestamped authorization model for data management systems
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Access control for large collections
ACM Transactions on Information Systems (TOIS)
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
RBAC support in object-oriented role databases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Rule based database access control—a practical approach
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Controlling access in multiuser interfaces
ACM Transactions on Computer-Human Interaction (TOCHI)
A discretionary access control model with temporal authorizations
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Research directions in object-oriented database systems
PODS '90 Proceedings of the ninth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems
The role graph model and conflict of interest
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Dynamic rights: safe extensible access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Controlled access and dissemination of XML documents
Proceedings of the 2nd international workshop on Web information and data management
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
A view-based access control model for CORBA
Secure Internet programming
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Towards a configurable security architecture
Data Engineering
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
A fine-grained access control system for XML documents
ACM Transactions on Information and System Security (TISSEC)
A cryptographic solution to implement access control in a hierarchy and more
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Secure and selective dissemination of XML documents
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
An Authorization Model for a Distributed Hypertext System
IEEE Transactions on Knowledge and Data Engineering
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A Content-Based Authorization Model for Digital Libraries
IEEE Transactions on Knowledge and Data Engineering
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
A Model of Methods Access Authorization in Object-oriented Databases
VLDB '93 Proceedings of the 19th International Conference on Very Large Data Bases
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Contexts and Views in Object-Oriented Languages
CONTEXT '99 Proceedings of the Second International and Interdisciplinary Conference on Modeling and Using Context
Resolving Conflicts in Authorization Delegations
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
An Access Control Model for Tree Data Structures
ISC '02 Proceedings of the 5th International Conference on Information Security
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace
DEXA '00 Proceedings of the 11th International Conference on Database and Expert Systems Applications
Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
An authorization system for digital libraries
The VLDB Journal — The International Journal on Very Large Data Bases
ObjectGlobe: Ubiquitous query processing on the Internet
The VLDB Journal — The International Journal on Very Large Data Bases
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
A Formal Model for Role-Based Access Control with Constraints
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Logical Framework for Reasoning on Data Access Control Policies
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Socrates: an environment for high performance computing
WET-ICE '95 Proceedings of the 4th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET-ICE'95)
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
ODAR: an on-the-fly damage assessment and repair system for commercial database applications
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Modeling contribution for virtual enterprise support
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
XML access control using static analysis
Proceedings of the 10th ACM conference on Computer and communications security
A protection scheme for collaborative environments
Proceedings of the 2003 ACM symposium on Applied computing
Using organisational safeguards to make justifiable privacy decisions when processing personal data
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
The semantics of an extended referential integrity for a multilevel secure relational data model
Data & Knowledge Engineering
A role-based approach to access control for XML databases
Proceedings of the ninth ACM symposium on Access control models and technologies
A compressed accessibility map for XML
ACM Transactions on Database Systems (TODS)
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
Proceedings of the thirteenth ACM international conference on Information and knowledge management
An authorization model for geographical maps
Proceedings of the 12th annual ACM international workshop on Geographic information systems
Database Security-Concepts, Approaches, and Challenges
IEEE Transactions on Dependable and Secure Computing
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Integration and Efficient Lookup of Compressed XML Accessibility Maps
IEEE Transactions on Knowledge and Data Engineering
An approach to cooperative updates of XML documents in distributed systems
Journal of Computer Security
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
XML access control using static analysis
ACM Transactions on Information and System Security (TISSEC)
Access control and audit model for the multidimensional modeling of data warehouses
Decision Support Systems
The dynamic predicate: integrating access control with query processing in XML databases
The VLDB Journal — The International Journal on Very Large Data Bases
Formalizing XML access control for update operations
Proceedings of the 12th ACM symposium on Access control models and technologies
Compressed accessibility map: efficient access control for XML
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Access control policies and languages
International Journal of Computational Science and Engineering
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
Towards Modal Logic Formalization of Role-Based Access Control with Object Classes
FORTE '07 Proceedings of the 27th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
A Methodology for Bridging between RBAC and an Arbitrary Application Program
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
Distributed and Parallel Databases
Programming versus databases in the object-oriented paradigm
Information and Software Technology
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Formalization of RBAC policy with object class hierarchy
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Part-whole reasoning in an object-centered framework
Part-whole reasoning in an object-centered framework
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
Detection of access control flaws in a distributed database system with local site autonomy
IDEAS'97 Proceedings of the 1997 international conference on International database engineering and applications symposium
Supporting multiple access control policies in database systems
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
The VLDB Journal — The International Journal on Very Large Data Bases
Optimized workflow authorization in service oriented architectures
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Specifying an access control model for ontologies for the semantic web
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Policies, models, and languages for access control
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
Two phase filtering for XML access control
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Inheritance in rule-based frame systems: semantics and inference
Journal on Data Semantics VII
Efficient access control for secure XML query processing in data streams
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
A purpose-based access control in native XML databases
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
The conventional models of authorization have been designed for database systems supporting the hierarchical, network, and relational models of data. However, these models are not adequate for next-generation database systems that support richer data models that include object-oriented concepts and semantic data modeling concepts. Rabitti, Woelk, and Kim [14] presented a preliminary model of authorization for use as the basis of an authorization mechanism in such database systems. In this paper we present a fuller model of authorization that fills a few major gaps that the conventional models of authorization cannot fill for next-generation database systems. We also further formalize the notion of implicit authorization and refine the application of the notion of implicit authorization to object-oriented and semantic modeling concepts. We also describe a user interface for using the model of authorization and consider key issues in implementing the authorization model.