Authorization Analysis of Queries in Object-Oriented Databases

نویسندگان

  • Hiroyuki Seki
  • Yasunori Ishihara
  • Minoru Ito
چکیده

A simple model for method-based authorization is defined and an algorithm is presented for testing in compile-time whether a given database schema violates authorizations. As an underlying model of method execution, we adopt the model proposed by Hull et al.; a database schema consists of a class hierarchy, attribute declarations and method definitions. A method body is simply a sequence of statements. There are three types of statements: an access to an attribute of the self object, a method invocation, and a built-in operation on basic values. Authorizations are represented as a pair of finite sets: AUTH = AUTHm AUTHs , AUTHm = ( 1 1 1 1) ( 2 2 2 2) . . . ( ) , AUTHs = ( 1 1 1) ( 2 2 2) . . . ( ) where is a subject (user, process), , are classes and , are method names. Given a database schema S, a subject and a set of authorizations AUTH, we say that (S ) is valid with respect to AUTH, if, whenever a method invoked by on an object of a class is directly invoking a method on an object of a class , ( ) belongs to AUTHs or ( ) belongs to AUTHm. In this paper we show that if one of the following conditions holds, then it can be decided in polynomial time whether (S ) is valid with respect to AUTH. 1. S is a retrieval schema, that is, does not contain any statement which updates an attribute. 2. S is a non-branching update schema, which permits updates in a restricted way, and a database instance is acyclic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Apply Uncertainty in Document-Oriented Database (MongoDB) Using F-XML

As moving to big data world where data is increasing in unstructured way with high velocity, there is a need of data-store to store this bundle amount of data. Traditionally, relational databases are used which are now not compatible to handle this large amount of data, so it is needed to move on to non-relational data-stores. In the current study, we have proposed an extension of the Mongo...

متن کامل

Apply Uncertainty in Document-Oriented Database (MongoDB) Using F-XML

As moving to big data world where data is increasing in unstructured way with high velocity, there is a need of data-store to store this bundle amount of data. Traditionally, relational databases are used which are now not compatible to handle this large amount of data, so it is needed to move on to non-relational data-stores. In the current study, we have proposed an extension of the Mongo...

متن کامل

A Security Model for Object-Oriented Databases

The Integration of object-oriented programming concepts with databases IS one of the most significant advances In the evolutlon of database systems and several recent pro}ects are developing object-oriented databases Among the many Issues brought along by this combination, one that IS becoming important ISthe protection of information We develop here an authorization model for objectorlented da...

متن کامل

A Model of Content-based Authorization in Object-Oriented Databases based on Object Views

Several models of authorization have been proposed for object-oriented databases supporting diierent levels of granularity. However, these models do not support authorization based on database contents and context. A way of handling context and content-dependent authorization is by using views. In this paper, we present a model of authorization, based on a view model proposed by Bertino 4], tha...

متن کامل

Using Usage Control to Access XML Databases

XML documents usually contain private information that cannot be shared by every user communities. It is widely used in web environment. XML database is becoming increasingly important since it consists of XML documents. Several applications for supporting selective access to data are available over the web. Usage control has been considered as the next generation access control model with dist...

متن کامل

Query Interoperation Among Object-Oriented and Relational Databases

We develop an eecient algorithm for the translation of high-order object queries to rst-order relational queries. The translation utilizes a canonical deductive database as a uniform representation of object-oriented schema and data. Object queries are translated to the canonical deductive database in which they are partially evaluated and optimized, before being translated to relational querie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995