skip to main content
10.1145/266741.266765acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

RBAC support in object-oriented role databases

Authors Info & Claims
Published:06 November 1997Publication History
First page image

References

  1. 1.A. Albano, G. Ghelli, and R. Orsini. Fibonacci: A Programming Language for Object Databases. VLDB Journal, 4(3):403-444, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.C.W. Bachman and M. Daya. The role concept in data models. In Proceedings of the Third International Conference on Very La~ye Databases, pages 464-476, 1977.Google ScholarGoogle Scholar
  3. 3.E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. Supporting periodic authorizatiolm and temporal reasoning in database access control. In Precedings of the 22nd VLDB Conference, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.I).D. Clark and D.R. Wilson. A comparison of commercial and military security policies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184- 194, April 1987.Google ScholarGoogle ScholarCross RefCross Ref
  5. 5.D. Ferraiolo and R. Kuhn. Role-based access controls. In Proceedings of 15th NIST-NCSC National Computer Security Conference, pages 554-563, October 1992.Google ScholarGoogle Scholar
  6. 6.G. Gottlob, M. Schrefl, and B. Rock. Extending Object- Oriented Systenm with Roles. A CM Transactions on lnfo~wmtion Sy.stems, July 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.G. Kappel et al. Workflow Management Based on Objects, Rules, and Roles. BuUetin of the 7~chnical Committee on Data Engineering, 18(1):11-18, March 1995.Google ScholarGoogle Scholar
  8. 8.P.A. Karger. Implementing commercial data integrity with secure capabilities. In Proceedings of 1EEE Symposium on Security and Privacy, pages 130-139, April 1988.Google ScholarGoogle ScholarCross RefCross Ref
  9. 9.F.M. Lain, H.L. Chau, and R.K. Wong. An efficient indexing scheme for objects with roles. In Proceedings of 15th British National Conference on Databases, July 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.T.M.P. Lee. Using mandatory integrity to enfore com- Security and Privacy, pages 140-146, April 1988.Google ScholarGoogle Scholar
  11. 11.H. Lieberinan. Using prototypical objects to implenmnt shared behavior in object-oriented systems. In N. Meyrowitz, editor, Object-Oriented Prog~umming: Systems, Languages and Applications, pages 214-223, October 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.A. Montanari, E. Peressi, and B. Pernici. Object migration in temporal object-oriented databases. Informatica, 18:467-484, 1994.Google ScholarGoogle Scholar
  13. 13.M. Nyanchama and S.L. Osborn. Role-based security, object-oriented databases ~z separation of duty. A CM SIGMOD Record, 22(4):45--51, December 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.B. Pernici. Objects with roles, in IEEE/ACM Conference on Office information System.s, Cambridge, Mass., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. 15.F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. A CM Transactions on Database Systems, 16(1), March 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.J. Richardson and P. Schwartz. Aspects: Extending objects to support multiple, independent roles. In ACM- SIGMOD International Conference on Management of Data, pages 298-307, Denver, Colorado, May 1991. ACM SIGM()D Record, Vol. 20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.R. Sandhu. Separation of duties in computerized information systems. {n S. Jajodia and C.E. Landwehr, editors, Database Security IV: Status ~ Prospects, pages 179-189. North-Ilolland, 1992.Google ScholarGoogle Scholar
  18. 18.R.S. Sandhu, E.J. Coyne, H.I,. Feinstein, and C.E. Youman. Role-based access control: A multidimensional view. In Proceedings of l Oth Annual Computer Security Applications Conference, pages 54-62, December 1994.Google ScholarGoogle ScholarCross RefCross Ref
  19. 19.E. Sciore. Object Specialization. A CM T~un.saction~ on Information Systems, 7(2):103-122, April 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.D.J. Thonmen. Role-based application design and enforcement. In S. dajodia and C.E. Landwehr, editors, Database Security IV: Status ~~ Prospects, pages 151. 168. North-Holland, 1992.Google ScholarGoogle Scholar
  21. 21.T.C. Ting, S.A. Dermurjan, and M.Y. Hu. Requiremeats capabilities and functionalities of user-role based security for an object-oriented design model. In C.E. Landwehr and S. Jajodia, editors, Database Sex:uT~ty V: Status ~ Prospects, pages 275-296. North-Holland, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22.R.K. Wong, H.L. Chau, and F.H. Lochovsky. A Data Model and Semantics of Objects with Dynamic Roles. In IEEE International Conference on Data Engineering, Apri} 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. RBAC support in object-oriented role databases

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            RBAC '97: Proceedings of the second ACM workshop on Role-based access control
            November 1997
            159 pages
            ISBN:0897919858
            DOI:10.1145/266741

            Copyright © 1997 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 6 November 1997

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Upcoming Conference

            SACMAT 2024

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader