A Cryptographic Mechanism for Object-Instance-Based Authorization in Object-Oriented Database Systems
نویسندگان
چکیده
In this paper a mechanism for access control at the instance level of a class in object-oriented databases is suggested. The approach is based on the use of pseudo-random functions and sibling intractable functions, rather than on the traditional access control list associated with each object. Each object-instance in the object-oriented model is associated with secure access keys that insure secure access to the object and all related objects. The security of the system depends on the diiculty of predicting the output of pseudo-random functions and on nding extra sibling collision for the sibling intractable function family. The authorization system supports ownership and granting/revoking of access rights.
منابع مشابه
Objects Identification in Object-Oriented Software Development - A Taxonomy and Survey on Techniques
Analysis and design of object oriented is onemodern paradigms for developing a system. In this paradigm, there are several objects and each object plays some specific roles. Identifying objects (and classes) is one of the most important steps in the object-oriented paradigm. This paper makes a literature review over techniques to identify objects and then presents six taxonomies for them. The f...
متن کاملA Model of Content-based Authorization in Object-Oriented Databases based on Object Views
Several models of authorization have been proposed for object-oriented databases supporting diierent levels of granularity. However, these models do not support authorization based on database contents and context. A way of handling context and content-dependent authorization is by using views. In this paper, we present a model of authorization, based on a view model proposed by Bertino 4], tha...
متن کاملModelsaz: An Object-Oriented Computer-Aided Modeling Environment
Modeling and simulation of processing plants are widely used in industry. Construction of a mathematical model for a plant is a time-consuming and error-prone task. In light of extensive advancements in computer science (both hardware and software), computers are becoming a necessary instrument in industrial activities. Many software tools for modeling, simulation and optimization of proces...
متن کاملUsing Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases
This is a discussion paper which presents a cryptographic solution for discretionary access control in object-oriented databases. Our approach is based on the use of pseudo-random functions and sibling intractable function families (SIFF). Each entity (object or class) in the object-oriented database model is associated with access keys that ensure secure access to that entity and all related e...
متن کاملDeclarative Semantics in Object-Oriented Software Development - A Taxonomy and Survey
One of the modern paradigms to develop an application is object oriented analysis and design. In this paradigm, there are several objects and each object plays some specific roles in applications. In an application, we must distinguish between procedural semantics and declarative semantics for their implementation in a specific programming language. For the procedural semantics, we can write a ...
متن کامل