ACM SIGMOD Anthology VLDB dblp.uni-trier.de

Synergistic Authorization in Database Systems.

Naftaly H. Minsky: Synergistic Authorization in Database Systems. VLDB 1981: 543-552
@inproceedings{DBLP:conf/vldb/Minsky81,
  author    = {Naftaly H. Minsky},
  title     = {Synergistic Authorization in Database Systems},
  booktitle = {Very Large Data Bases, 7th International Conference, September
               9-11, 1981, Cannes, France, Proceedings},
  publisher = {IEEE Computer Society},
  year      = {1981},
  pages     = {543-552},
  ee        = {db/conf/vldb/Minsky81.html},
  crossref  = {DBLP:conf/vldb/81},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}

Abstract

We say that an authorization scheme exhibits synergistic effects if it allowes for the power provided by the union of two privileges to be larger than the union of the powers of the individual privileges. This phenomenon where the whole is larger than the sum of its parts is shown to be essential for the support of some important classes of authorization policies, and useful for the optimization of the enforcement of authorization-based rules. An authorization scheme which exhibits synergistic effects is introduced and some of its applications are discussed.*

Copyright © 1981 by The Institute of Electrical and Electronic Engineers, Inc. (IEEE). Abstract used with permission.


ACM SIGMOD Anthology

CDROM Version: Load the CDROM "Volume 1 Issue 4, VLDB '75-'88" and ... DVD Version: Load ACM SIGMOD Anthology DVD 1" and ...

Printed Edition

Very Large Data Bases, 7th International Conference, September 9-11, 1981, Cannes, France, Proceedings. IEEE Computer Society 1981
Contents CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

References

[GRIFFITHS and WADE 1976]
Patricia P. Griffiths, Bradford W. Wade: An Authorization Mechanism for a Relational Database System. ACM Trans. Database Syst. 1(3): 242-255(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[JONES et al, 1976]
Anita K. Jones, Richard J. Lipton, Lawrence Snyder: A Linear Time Algorithm for Deciding Security. FOCS 1976: 33-41 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[LINDEN 1976]
Theodore A. Linden: Operating System Structures to Support Security and Reliable Software. ACM Comput. Surv. 8(4): 409-445(1976) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[LOCKMAN 1981]
Abe Lockman, Naftaly H. Minsky: Unidirectional Transport of Rights and Take-Grant Control. IEEE Trans. Software Eng. 8(6): 597-604(1982) CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[MINSKY 1974]
Naftaly H. Minsky: On Interaction with Data Bases. SIGMOD Workshop, Vol. 1 1974: 51-62 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML
[MINSKY 1977]
...
[MINSKY 1978]
...
[MINSKY 1978]
...
[MINSKY 1981]
...
[STONEBRAKER 1975]
Michael Stonebraker: Implementation of Integrity Constraints and Views by Query Modification. SIGMOD Conference 1975: 65-78 CiteSeerX Google scholar pubzone.org BibTeX bibliographical record in XML

Copyright © Tue Mar 16 02:21:56 2010 by Michael Ley (ley@uni-trier.de)