1991
DOI: 10.1145/103140.103144
|View full text |Cite
|
Sign up to set email alerts
|

A model of authorization for next-generation database systems

Abstract: The conventional models of authorization have been designed for database systems supporting the hierarchical, network, and relational models of data. However, these models are not adequate for next-generation database systems that support richer data models that include object-oriented concepts and semantic data modeling concepts. Rabitti, Woelk, and Kim [141 presented a preliminary model of authorization for use as the basis of an authorization mechanism in such database systems. In this paper we present a fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
117
0
5

Year Published

1996
1996
2012
2012

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 261 publications
(128 citation statements)
references
References 14 publications
0
117
0
5
Order By: Relevance
“…In this section, the performance of the XML access control method [13] is compared with the proposed method and related work. The performances of the proposed method before and after access control is applied are also compared and analyzed by dividing them into memory usage and processing time.…”
Section: Discussionmentioning
confidence: 99%
“…In this section, the performance of the XML access control method [13] is compared with the proposed method and related work. The performances of the proposed method before and after access control is applied are also compared and analyzed by dividing them into memory usage and processing time.…”
Section: Discussionmentioning
confidence: 99%
“…Figure 14 illustrates an example of object hierarchy. Even actions can be organized hierarchically, where the hierarchy may reflect an implication of privileges (e.g., write is more powerful than read [70]) or a grouping of sets of privileges (e.g., a "writing privileges" group can be defined containing write, append, and undo [84]). These hierarchical relationships can be exploited i) to support preconditions on accesses (e.g., in Unix a subject needs the execute, x, privilege on a directory in order to access the files within it), or ii) to support authorization implication, that is, authorizations specified on an abstraction apply to all its members.…”
Section: Expanding Authorizationsmentioning
confidence: 99%
“…To address situations like this, some approaches proposed adopting explicit priorities. In ORION [70], authorizations are classified as strong or weak : weak authorizations override each other based on the most-specific policy, and strong authorizations override weak authorizations (no matter their specificity) and cannot be overridden. Given that strong authorizations must be certainly obeyed, they are required to be consistent.…”
Section: Expanding Authorizationsmentioning
confidence: 99%
“…Among comparable proposals, in [2], an access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Finally, the use of authorization priorities with propagation and overriding, which is an important aspect of XML access control may recall approaches in the context of object-oriented databases, like [9] and [18]. Although our proposal is based on existing XML authorization models such as [6], we focus on how to use relational databases to help enforce XML authorization models, and none of the above XML authorization models address the interaction between XML and relational access controls.…”
Section: Xml and Relational Security Modelsmentioning
confidence: 99%