Nested categories for access control

نویسنده

  • Ravinderpal Singh Sandhu
چکیده

We consider an access control hierarchy based on nested categories. Nested categories are sets of compartments with the property that any two categories are either disjoint or one wholly contains the other. We present a method for representing nested categories by assigning a pair of integers called k-values to each category. Authorization of a user to access an object is determined by comparing Ir-values of the user and object categories. Our method has the notable property that categories can be reorganized by computing new k-values for categories which are changed without affecting Ir-values of unchanged categories.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TCP behavior in a DVB-RCS environment

In 2000, ETSI has approved and published a standard for interactive broadband satellite services (DVB-RCS) . One of the most important features of this standard is the implementation of DAMA strategies aiming at a fair and efficient use of the shared resources in the satellite return channel. A DAMA scheme introduces a new control loop, based on a signaling exchange between STs and the NCC, ins...

متن کامل

بررسی روند مطالعات مورد ـ شاهد لانه گزیده و مقایسه‌ی آن با مطالعات هم‌گروهی و مورد ـ شاهد از سال 2005 ـ 1996

Background & Objectives: This investigation was prompted by the growing importance of nested case-control studies and the increasing frequency with which they are done in epidemiologic research. After a brief explanation of nested case-control studies, we evaluate the trends in research methodology over the last decade, especially with regard to cohort, case-control, and nested case-control des...

متن کامل

Root Classification Increasing

Database security is usually implemented in terms of access control. Mandatory security requires classi cation levels for objects and clearance levels for subjects. In Object Oriented Databases, all operations are invoked via message passing. Such operations belong to two categories: those that create new objects and those that do not. The security scheme must use di erent rules to handle the t...

متن کامل

مقایسه روش شناسی تحلیل مورد- شاهدی لانه گزیده و هم‌گروهی بر روی داده‌های مربوط به بیماری سل شهرستان: یک تجربه

Background and objective: The nested case-control study has become popular as an efficient alternative to the full-cohort design. This study compares the results of a nested case-control analysis approach with the full cohort analysis. Methods: A cohort of 276 subjects (new cases from a TB registry) was used for this study. Cox Regression model was used for the full cohort analysis. In orde...

متن کامل

Using Actors to Build a Parallel DBMS

In this paper, we present the design and the architecture of a parallel main memory database management system. We focus on concurrency control scheme and recovery. Our prototype is based on the concept of “database actors”, an object-oriented data model well suited for parallel manipulations. The storage sub system is built upon distributed Ram-files using SDDS (Scalable Distributed Data Struc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 7  شماره 

صفحات  -

تاریخ انتشار 1988