• DocumentCode
    750409
  • Title

    Database Access Control in the Presence of Context Dependent Protection Requirements

  • Author

    Hsiao, David K. ; Kerr, Douglas S. ; Nee, Chen-Jen

  • Author_Institution
    Department of Computer and Information Science, The Ohio State University
  • Issue
    4
  • fYear
    1979
  • fDate
    7/1/1979 12:00:00 AM
  • Firstpage
    349
  • Lastpage
    358
  • Abstract
    Data items in a database are semantically related. Thus, the access control mechanism of a database system must be concerned with the possibility that access to one item may violate a denied access to another item. This study concentrates on two basic semantic relations for protection requirements. By utilizing a graph-theoretic approach, some of the fundamental properties of the protection relations can be readily identified. These properties can then be used as a basis for understanding more general context dependent protection requirements. Two fundamental properties of the two protection relations are found. The first property addresses the question: given a database with a set of protection relations, is it possible to find a maximal subset of the database such that access to one item of the subset will not lead to any violation of a denied access to another item? The second property addresses the question: given a database with a set of protection relations, is it possible to find a sequence of accesses such that the protection requirement is enforced with no violation?
  • Keywords
    Access control; context protection; graph-theoretic approach; security; Access control; Containers; Data security; Database systems; Information processing; Information science; Permission; Protection; Access control; context protection; graph-theoretic approach; security;
  • fLanguage
    English
  • Journal_Title
    Software Engineering, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    0098-5589
  • Type

    jour

  • DOI
    10.1109/TSE.1979.234202
  • Filename
    1702640