Skip to main content

A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace

  • Conference paper
  • First Online:
Database and Expert Systems Applications (DEXA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1873))

Included in the following conference series:

Abstract

In this paper we compare two approaches for implementing Security and Privacy systems in Cyberspace: a structured approach, such as done in Mokum, where access is governed by structure (of the classes), and two principles: the epistemic and the ontologic principle. The second approach is based on the use of capabilities, such as provided by ERP systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dehne, F., R.P. van de Riet: A Guided Tour through Mokum 2.0, IR-368, Faculteit Wiskunde en Informatica, VU, October 1994.

    Google Scholar 

  2. Gendler-Fishman, Masha, Ehud Gudes: Compile-time Flow analysis of Transactions and Methods in Object-Oriented Databases, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–10

    Google Scholar 

  3. Gudes, Ehud, Reind van de Riet, Hans Burg, Martin Olivier: Alter-egos and Roles Supporting WorkFlow Security in Cyberspace, in:T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 152–166.

    Google Scholar 

  4. Hale, John, Jody Threet, Sujeet Shenoi: Capability-Based Primitives for Access Control in Object-Oriented Systems, in: T.Y. Lin, Sh. Qian (Eds)., Proceedings of Eleventh IFIP WG11.3 Working Conference on Database Security, Lake Tahoe, 1997, pp. 88–103.

    Google Scholar 

  5. Olivier, M.S. E. Gudes, R.P. van de Riet, J.F.M. Burg: Specifying Application-lev el Security in Workflow Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 346–354.

    Google Scholar 

  6. Riet, R.P. van de, Beukering, J.: The Integration of Security and Integrity Constraints in MOKUM in: J. Biskup, M. Morgenstern, C. Landwehr (Eds), Proceedings of IFIP WG11.3 Working Conference on Database Security, IFIP/ North Holland, 1994,pp. 223–246.

    Google Scholar 

  7. Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: Who is Responsible? in: Proceedings WebNet96, San Francisco, AACE (Association for the Advancement of Computing in Education), Charlottesville, USA pp. 462–467, 1996.

    Google Scholar 

  8. Riet, R.P. van de, J.F.M. Burg, Modelling Alter Egos in Cyberspace: using a Work Flow management tool: who takes care of the Security and Privacy in: S. Lobodzinsky, I. Tomek (Eds)., Proceedings of WebNet97, Toronto, Association for the Advancement of Computing.

    Google Scholar 

  9. Rabitti, F., E. Bertino, W. Kim, D. Woelk: A Model of Authorization for nextgeneration database systems, ACM Transactions on Database Systems, Vol. 16, No. 1, pp. 88–131, 1991.

    Article  Google Scholar 

  10. Radu, S., F. Dehne and R.P. van de Riet, A first step towards distributed Mokum, Technical Report 428, Computer Science Department, Vrije Universiteit, 1997.

    Google Scholar 

  11. Riet, R.P. van de, E. Gudes: An Object-Oriented Database Architecture for Providing High-Level Security in Cyberspace in: P. Samarati, R. Sandhu (Eds)., Proceedings of Tenth IFIP WG11.3 Working Conference on Database Security, Como 1996, pp. 92–115.

    Google Scholar 

  12. Riet, R.P. van de, Andrea Junk & E. Gudes: Security in Cyberspace: a Knowledge-base Approach, Data and Knowledge Engineering, Vol 24, Nr. 1, North Holland, 1997, pp. 69–98.

    Article  Google Scholar 

  13. Riet, R.P. van de, W. Janssen, P. de Gruijter: Security moving from Database Systems to ERP Systems in: R. Wagner (Ed). Database and Expert Systems Applications, IEEE Computer Society, 1998, pp. 273–280.

    Google Scholar 

  14. Stonebraker, M., E. Wong, P. Kreps, G. Held: The Design and Implementation of INGRES, Transactions on Database Systems, ACM, Vol 1, Nr. 3. pp. 189–222., 1976.

    Article  Google Scholar 

  15. Wouter Teepe, Reind van de Riet, Martin Olivier: WorkFlow Analyzed for Security and Privacy in using Databases; submitted for publication. 2000.

    Google Scholar 

  16. Varadharajan, V. Distributed Object System Security, Information Security-the next Decade, Edited by H.P Eloff and S. H. von Solms, Chapman & Hall, 1995, pp. 305–321.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

van de Riet, R., Janssen, W., Olivier, M., Serban, R. (2000). A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. In: Ibrahim, M., Küng, J., Revell, N. (eds) Database and Expert Systems Applications. DEXA 2000. Lecture Notes in Computer Science, vol 1873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44469-6_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-44469-6_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67978-3

  • Online ISBN: 978-3-540-44469-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics