Implicit Authorization Mechanism of Object-Oriented Database
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
Implicit Authorization Mechanism of Object-Oriented Database

Authors: Haibo Hu, Hong Xiang

Abstract:

Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.

Keywords: Object-oriented database(OODB), security protection, authorization mechanism, implicit authorization, authorization check.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1081527

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1728

References:


[1] Oki Y, Chikaraishi T, Shimomura T and Ohta T. A design method for data integrity in object-oriented database systems. International Conference on Information Engineering, Proceedings of IEEE Singapore, 1995: 204-209.
[2] Ambhore, Premchand B, Meshram B, and Waghmare V B. An implementation of object-oriented database security. Software Engineering Research, Management & Applications, 2007. SERA 2007. 5th ACIS International Conference, 2007:359-365.
[3] Fernandez E B, Gudes E, and Hauyan Song. A model for evaluation and administration of security in object-oriented database systems. Knowledge and Data Engineering, IEEE Transactions on Vol. 6, Issue 2, April 1994: 275-292.
[4] Bertino E, Bettini C, Ferrari E and Samarati P. A temporal access control mechanism for database systems (J). Knowledge and Data Engineering, IEEE Transactions on Vol. 8, Issue 1, February. 1996: 67-80.
[5] Demurjian SA, Hu M Y, Ting T C and Kleinman D. Towards an Authorizaiton Mechanism for User-Role Based Security in an Object-Oriented Design model(C). Computer and Communications, 1993, 12th Annual International Phoenix Conference on, March 1993:195-202.
[6] Thomas R K, Sandhu R S. A Trusted Subject Architecture for Multilevel Secure Object-oriented Database (J). Knowledge and Data Engineering, IEEE Transactions on Vol. 8, Issue 1, Feb. 1996: 16-31.
[7] Bertino E, Jajodia S and Samarati P. Supporting multiple access policies in database systems(C). Security and Privacy, 1996. Proceedings, 1996 IEEE Symposium on May1996: 94-107.
[8] Xu Jiepan, Object Oriented Database and Applications. Beijing: Science Press, 2003:78-95.
[9] Ni Xianjun. A logic specification and implementation approach for object-oriented database security. Knowledge Discovery and Data Mining, 2008. WKDD 2008. International Workshop, 2008: 461-464.
[10] Zhou Deyu, Luobin, Chen Shifu, Security Model for Object-Oriented Database Systems and its Application. Computer Engineering and Applications. 2003.27:210-212.
[11] Wang Yijie, Object Oriented Database. Beijing: Electronic Industry Press, 2003:253-267.
[12] Zhang Min, Xu Zhen, Feng Dengguo, Database Security. Beijing: Science Press, 2005: 140-146.
[13] Chen Qiang. The Problem About the Safe Protection of Object-oriented Database. Computer Engineering Vol. 24, No.6, 1994:41-43.
[14] Milen J K, Lunt T F. Security for object-oriented database systems. Research in Security and Privacy, 1992. Proceedings, 1992 IEEE Computer Society Symposium on May. 1992: 260-272.
[15] Zhang C N, Honglan Zhong. An Integrated approach for database security and fault tolerance. Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on Vol. 1, 2004: 762-766.