A model of authorization for next-generation database systems
- 1 March 1991
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Database Systems
- Vol. 16 (1), 88-131
- https://doi.org/10.1145/103140.103144
Abstract
The conventional models of authorization have been designed for database systems supporting the hierarchical, network, and relational models of data. However, these models are not adequate for next-generation database systems that support richer data models that include object-oriented concepts and semantic data modeling concepts. Rabitti, Woelk, and Kim [14] presented a preliminary model of authorization for use as the basis of an authorization mechanism in such database systems. In this paper we present a fuller model of authorization that fills a few major gaps that the conventional models of authorization cannot fill for next-generation database systems. We also further formalize the notion of implicit authorization and refine the application of the notion of implicit authorization to object-oriented and semantic modeling concepts. We also describe a user interface for using the model of authorization and consider key issues in implementing the authorization model.Keywords
This publication has 8 references indexed in Scilit:
- Mandatory security in object-oriented database systemsPublished by Association for Computing Machinery (ACM) ,1989
- Composite objects revisitedPublished by Association for Computing Machinery (ACM) ,1989
- Integrating an object-oriented programming system with a database systemPublished by Association for Computing Machinery (ACM) ,1988
- Composite object support in an object-oriented database systemPublished by Association for Computing Machinery (ACM) ,1987
- Data model issues for object-oriented applicationsACM Transactions on Information Systems, 1987
- An authorization mechanism for a relational database systemACM Transactions on Database Systems, 1976
- An authorization model for a shared data basePublished by Association for Computing Machinery (ACM) ,1975
- Definition and evaluation of access rules in data management systemsPublished by Association for Computing Machinery (ACM) ,1975