ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Information Protection by Method Base Systems.

Rainer Hüber, Peter C. Lockemann: Information Protection by Method Base Systems. VLDB 1978: 420-426
@inproceedings{DBLP:conf/vldb/HuberL78,
  author    = {Rainer H{\"u}ber and
               Peter C. Lockemann},
  editor    = {S. Bing Yao},
  title     = {Information Protection by Method Base Systems},
  booktitle = {Fourth International Conference on Very Large Data Bases, September
               13-15, 1978, West Berlin, Germany},
  publisher = {IEEE Computer Society},
  year      = {1978},
  pages     = {420-426},
  ee        = {db/conf/vldb/HuberL78.html},
  crossref  = {DBLP:conf/vldb/78},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

Protection of data against unauthorized access (read or write operations) as currently practised in data base systems is too crude a measure to be effective in an environment with a large diversity of progmms for evaluating the data base. Too restrictive a protection prohibits the application of all but the simplest programs, while too broad an authorization allows wide latitude in programs but may open up too many data to individual inspection. The most obvious way to solve this dilemma is for the protection to take the program within which the data is used into consideration. It is shown that a number of measures must accompany this solution in order to be effective: a method base, the control of sets of data, and a hierarchical system structure. Some fundamental problems are outlined and some technical solutions are proposed. In particular, the type of facilities provided by the data base system has an influence on the efficiency of the protection mechanism.

Copyright © 1978 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...

Printed Edition

S. Bing Yao (Ed.): Fourth International Conference on Very Large Data Bases, September 13-15, 1978, West Berlin, Germany. IEEE Computer Society 1978
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

References

[1]
...
[2]
...
[3]
David P. Dobkin, Anita K. Jones, Richard J. Lipton: Secure Databases: Protection Against User Influence. ACM Trans. Database Syst. 4(1): 97-106(1979) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[4]
Naftaly H. Minsky: Intentional Resolution of Privacy Protection in Database Systems. Commun. ACM 19(3): 148-159(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[5]
...
[6]
John B. Kam, Jeffrey D. Ullman: A Model of Statistical Databases and Their Security. ACM Trans. Database Syst. 2(1): 1-10(1977) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[7]
...
[8]
Clement T. Yu, Francis Y. L. Chin: A Study on the Protection of Statistical Data Bases. SIGMOD Conference 1977: 169-181 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[9]
Francis Y. L. Chin: Security in Statistical Databases for Queries with Small Counts. ACM Trans. Database Syst. 3(1): 92-104(1978) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[10]
...
[11]
James I. Cash, Andrew B. Whinston, William D. Haseman: Security for the GPLAN system. Inf. Syst. 2(2): 41-48(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[12]
...
[13]
Richard W. Conway, William L. Maxwell, Howard L. Morgan: On the Implementation of Security Measures in Information Systems. Commun. ACM 15(4): 211-220(1972) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[14]
...
[15]
...
[16]
Theodore A. Linden: Operating System Structures to Support Security and Reliable Software. ACM Comput. Surv. 8(4): 409-445(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[17]
...
[18]
...
[19]
...

Copyright © Tue Mar 16 02:21:55 2010 by Michael Ley (ley@uni-trier.de)