1970
DOI: 10.1147/sj.94.0258
|View full text |Cite
|
Sign up to set email alerts
|

The authorization problem in shared files

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

1973
1973
1978
1978

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…The protection data, not to be confused with the protection specification, is data internal to the protection mechanism. Examples are passwords in case of the passwords protection mechan ism, or tags in Friedman's model [FRI70]. The protection procedure is analogous to programs or procedures in pro gramming systems and is the coded form of the protection mechanism algorithm.…”
Section: Basic Concepts In Data Base Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…The protection data, not to be confused with the protection specification, is data internal to the protection mechanism. Examples are passwords in case of the passwords protection mechan ism, or tags in Friedman's model [FRI70]. The protection procedure is analogous to programs or procedures in pro gramming systems and is the coded form of the protection mechanism algorithm.…”
Section: Basic Concepts In Data Base Securitymentioning
confidence: 99%
“…While such changes are pro hibited by the protection mechanism, the probability of failure, which is never zero, increases. An example of a late binding in which the chance for a "security flaw" is small, is Friedman's authorization model [FRI70]. To summarize, there are three issues involved with protection binding; efficiency, flexibility and the probability of a "security flaw".…”
Section: Procedures Protection Procedures Temporary Variables Protectiomentioning
confidence: 99%
“…The need for access control in a data base management system has been discussed at length elsewhere [1, 3,4,5] and will not be further considered here. What is clearly required is an access control system which is flexible and powerful, yet simultaneously does not require undue execution time overhead.…”
Section: Introductionmentioning
confidence: 99%
“…In this general design a physical to logical mapping is used which takes the form of a tag on each piece of separately protectable data in the data base [FriT70]. This tag is maintained completely by the base kernel and the DMM has no knowledge of it.…”
Section: Employee Address)mentioning
confidence: 99%