Affiliation:
1. Microelectronics and Computer Technology Corp.
Abstract
The conventional models of authorization have been designed for database systems supporting the hierarchical, network, and relational models of data. However, these models are not adequate for next-generation database systems that support richer data models that include object-oriented concepts and semantic data modeling concepts. Rabitti, Woelk, and Kim [14] presented a preliminary model of authorization for use as the basis of an authorization mechanism in such database systems. In this paper we present a fuller model of authorization that fills a few major gaps that the conventional models of authorization cannot fill for next-generation database systems. We also further formalize the notion of implicit authorization and refine the application of the notion of implicit authorization to object-oriented and semantic modeling concepts. We also describe a user interface for using the model of authorization and consider key issues in implementing the authorization model.
Publisher
Association for Computing Machinery (ACM)
Cited by
162 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Secure Multimedia Data Systems in the Era of Artificial Intelligence: Significant Progress and Vision for the Future;2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2023-11-01
2. Fine Grained Communication Control for IoT and CPS;Access Control Models and Architectures For IoT and Cyber Physical Systems;2022
3. ABAC-CC;Proceedings of the 25th ACM Symposium on Access Control Models and Technologies;2020-05-28
4. Polisma - A Framework for Learning Attribute-Based Access Control Policies;Computer Security – ESORICS 2020;2020
5. Methods and Tools for Policy Analysis;ACM Computing Surveys;2019-11-30