Proceedings of the 1974 Annual Conference on - ACM 74 1974
DOI: 10.1145/800182.810400
|View full text |Cite
|
Sign up to set email alerts
|

Access control in a relational data base management system by query modification

Abstract: This work describes the access control system being implemented in INGRES (l__N_Nteractive Graphics and REtrieval S~stem).The scheme can be applied to any relational data base management system and has several advantages over other suggested schemes.These include: a) implementation ease b) small execution time overhead c) powerful and flexible controls d) conceptual simplicity The basic idea utilized is that a user interaction with the data base is modified to an alternate form which is guaranteed to have no a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
52
0
1

Year Published

1976
1976
2016
2016

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 109 publications
(55 citation statements)
references
References 12 publications
0
52
0
1
Order By: Relevance
“…Query modification was used in the INGRES relational DBMS [3] to implement integrity constraints,views [4] and discretionary access control [5]. The SQUEL query language is used to specify these integrity constraints, views and access control restrictions.…”
Section: Indi Related Workmentioning
confidence: 99%
“…Query modification was used in the INGRES relational DBMS [3] to implement integrity constraints,views [4] and discretionary access control [5]. The SQUEL query language is used to specify these integrity constraints, views and access control restrictions.…”
Section: Indi Related Workmentioning
confidence: 99%
“…Another interesting work was suggested by Stonebraker [5]. In this case, the query transformation is specified by adding conditions to qualification portion of the original query.…”
Section: Related Workmentioning
confidence: 99%
“…The idea of modifying queries for access control was introduced in [24], and the idea of "reformulating" queries for security was also alluded to by [25]. A query rewrite mechanism to control access to federated XML user-profile data was used by [22].…”
Section: Related Workmentioning
confidence: 99%