Skip to main content

Authorization in Object Oriented Databases

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1587))

Included in the following conference series:

  • 412 Accesses

Abstract

Formal specification on authorization in object oriented databases is becoming increasingly significant. However most of the work in this field suffers a lack of formal logic semantics to characterize different types of inheritance properties of authorization policies among complex data objects. In this paper, we propose a logic formalization specify object oriented databases together with authorization policies. Our formalization has a high level language structure to specify object oriented databases and allows various types of authorizations to be associated with.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Y. Bai and V. Varadharajan, A logic for state transformations in authorization policies. In the Proceedings of the 10th IEEE Computer Security Foundations Workshop, pp 173–182, Massachusetts, June, 1997.

    Google Scholar 

  2. Y. Bai and V. Varadharajan, A Logical Formalization for Specifying Authorizations in Object Oriented Databases. Manuscript, Nov. 1998.

    Google Scholar 

  3. E.B. Fernandez, R.B. France, D. Wei, A formal specification of an authorization model for object-oriented databases. In Database Security, IX: Status and Prospects, pp. 95–109. Elsevier Science Publishers B. V., 1995.

    Google Scholar 

  4. E. Gudes, H. Song, E.B. Fernandez, Evaluation of negative, predicate, and instance-based authorization in object-oriented databases. In Database Security, IV: Status and Prospects, pp 85–98. S. Jajodia and C.E. Landwehr (Editors). Elsevier Science Publishers B. V., 1991.

    Google Scholar 

  5. M. Kifer, G. Lausen, J. Wu, Logical foundations of object-oriented and frame-based languages. Journal of ACM, Vol. 42, No. 4 (July), pp. 741–843, 1995.

    Article  MATH  MathSciNet  Google Scholar 

  6. T.F. Lunt, Discretionary Security for Object-Oriented Database Systems, Technical Report 7543, Computer Science Laboratory, SRI International, 1990.

    Google Scholar 

  7. J.K. Millen, T.F. Lunt, Security for Object-Oriented Database Systems, Proceedings of IEEE Symposium on Research in Security and Privacy, pp 260–272, 1992.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bai, Y., Varadharajan, V. (1999). Authorization in Object Oriented Databases. In: Pieprzyk, J., Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 1999. Lecture Notes in Computer Science, vol 1587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48970-3_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-48970-3_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65756-9

  • Online ISBN: 978-3-540-48970-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics