Skip to main content

Access Control for Deductive Databases by Logic Programming

  • Conference paper
  • First Online:
Logic Programming (ICLP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2401))

Included in the following conference series:

Abstract

We show how logic programs may be used to protect deductive databases from the unauthorized retrieval of positive and negative information, and from unauthorized insert and delete requests. To achieve this protection, a deductive database is expressed in a form that is guaranteed to permit only authorized access requests to be performed. The protection of the positive information that may be retrieved from a database and the information that may be inserted are treated in a uniform way as is the protection of the negative information in the database, and the information that may be deleted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barker, S., Data Protection by Logic Programming, 1st International Conference on Computational Logic, LNAI 1861, 1300–1313, Springer, 2000.

    Google Scholar 

  2. Barker, S., Secure Deductive Databases, 3rd Inat. Symp. on Practical Applications of Declarative Languages (PADL’01), LNCS 1990, Springer, 123–137, 2001.

    Chapter  Google Scholar 

  3. Barker, S., TRBACN: A Temporal Authorization Model, Proc. MMMANCS International Workshop on Network Security, LNCS 2052, 178–188, Springer, 2001.

    Google Scholar 

  4. Barker. S., and Douglas, P., Secure Web Access, in preparation.

    Google Scholar 

  5. Barker. S., Extended Protected Databases, in preparation.

    Google Scholar 

  6. Bonatti, P., Kraus, S., and Subrahmanian, V., Foundations of Secure Deductive Databases, IEEE Trans. on Knowledge and Data Engineering, 7,3, 406–422, 1995.

    Article  Google Scholar 

  7. Castano, S., Fugini, M., Martella, G., and Samarati, P., Database Security, Addison-Wesley, 1995.

    Google Scholar 

  8. Chen, W., and Warren, D., Tabled Evaluation with Delaying for General Logic Programs, J. A CM, 43(1), 20–74, 1996.

    Article  MATH  MathSciNet  Google Scholar 

  9. Cuppens, F., and Demolombe, R., A Modal Logical Framework for Security Policies, ISMIS’97, 1997.

    Google Scholar 

  10. Date, C., An Introduction to Database Systems, Addison-Wesley, 2000.

    Google Scholar 

  11. Ferraiolo, D., Gilbert, D., and Lynch, N., An Examination of Federal and Commercial Access Control Policy Needs, Proc. 16th NIST-NSA National Computer Security Conference, 107–116, 1993.

    Google Scholar 

  12. Gardenfors, P., Knowledge in Flux: Modeling the Dynamics of Epistemic States, MIT Press, 1988.

    Google Scholar 

  13. Hogger, C., Foundations of Logic Programming, Oxford, 1990.

    Google Scholar 

  14. Jajodia, S., Samarati, P., and Subrahmanian, V., A Logical Language for Expressing Authorizations, Proc. IEEE Symp. on Security and Privacy, 94–107, 1997.

    Google Scholar 

  15. Jamil, H., Belief Reasoning in MLS Deductive Databases, ACM SIGMOD’99, 109–120, 1999.

    Google Scholar 

  16. LLoyd, J., Foundations of Logic Programming, Springer, 1987.

    Google Scholar 

  17. Minker, J., Logic and Databases: A 20 Year Retrospective, 1st International Workshop on Logic in Databases, LNCS 1154, 3–57, Springer, 1996.

    Chapter  Google Scholar 

  18. Przymusinski, T., Perfect Model Semantics, Proc. 5th ICLP, MIT Press, 1081–1096, 1988.

    Google Scholar 

  19. Sagonas, K., Swift, T., Warren, D., Freire, J., Rao, P., The XSB System, Version 2.0, Programmer’s Manual, 1999.

    Google Scholar 

  20. Sandhu, R., Ferraiolo, D., and Kuhn, R., The NIST Model for Role-Based Access Control: Towards a Unified Standard, Proc. 4th ACM Workshop on Role-Based Access Control, 47–61, 2000.

    Google Scholar 

  21. Ullman, J., Principles of Database and Knowledge-Base Systems: Volume 1, Computer Science Press, 1990.

    Google Scholar 

  22. Van Gelder, A., Ross, K., and Schlipf, J., The Well-Founded Semantics for General Logic Programs, J. ACM, 38(3), 620–650, 1991.

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Barker, S. (2002). Access Control for Deductive Databases by Logic Programming. In: Stuckey, P.J. (eds) Logic Programming. ICLP 2002. Lecture Notes in Computer Science, vol 2401. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45619-8_5

Download citation

  • DOI: https://doi.org/10.1007/3-540-45619-8_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43930-1

  • Online ISBN: 978-3-540-45619-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics