Access control and management in multilevel database models

  • Bussolati U. 
  • G. Martella
Data Systems
Part of the Lecture Notes in Computer Science book series (LNCS, volume 123)


Description and management of security information are needed in large or complex databases independently of the database itself is physically structured.

In this paper one authorization mechanism basing on three logical security levels is presented. The proposed architecture reflects the logical architecture of the multilevel view of databases. For each level the security information description models are discussed. Finally a grant and revocation algorithm is illustrated.


Access Control Security Information Conceptual Schema Data Base Management System Logical Architecture 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Fernandez E.B., R.C. Summers and Coleman C.D.: “An Authorization Model for a Shared Database”. Proc. 1975 SIGMOD Int. Conf. ACM, New York, pp. 23–31.Google Scholar
  2. [2]
    Griffiths P.P. and Wade B.W.: “An Authoritation Mechanism for a Relational Database Systems” ACM TODS 1, 242–255 (1976).Google Scholar
  3. [3]
    Stonebraker L. et al.: “The design and implementation of INGRES”. ACM TODS 1, 189–222 (1976)Google Scholar
  4. [4]
    ANSI/X3/SPARK. DBMS Framework Report of the Study Group on Database Management System (Ed. by D. Tsichritzis and A. Klung) AFIPS Press, Montvale, New Jersey (1977).Google Scholar
  5. [5]
    Wood C. and Fernandez E.B.: “Decentralized Authorization in a Database System”, Proc of 5th Int. Conf. on VLDB, Rio de Janiero, 1979.Google Scholar
  6. [6]
    Wood C., Summers R.C. and Fernandez E.B.: “Authorization in Multilevel Database Models” Inform. System Vol. 4, n. 4 pag. 155–161, 1979.Google Scholar
  7. [7]
    Bussolati U., Martella G.: “Managing Data Privacy in Database Management Systems” Proc of Convention Informatique Latine, CIL 81, Barcellona (1981).Google Scholar
  8. [8]
    Bussolati U., Martella G.: “On Designing a Security Management System for Distributed Databases” IEEE Proc. 4th International Computer Software and Application Conference, COMPSAC 80, Chicago (1980).Google Scholar
  9. [9]
    Baldissera C., Ceri S., Pelagatti G., Bracchi G.: Interactive Specification and Formal Verification of User's View in Database Design”. Proc 5th Int. Conf. on VLDB, Rio de Janiero, 1979.Google Scholar
  10. [10]
    Biller H.: “On the equivalence of Database schemas. A semantic approach to data translation”. Information Systems, Vol. 4, n. 1, 1979.Google Scholar
  11. [11]
    Bracchi G., Paolini P., Pelegatti G.: “Binary Logical Associations in Data Modelling” in Nijssen G.M. (Ed.) “Modelling in Database Management Systems” North Holland, 1976.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1981

Authors and Affiliations

  • Bussolati U. 
    • 1
  • G. Martella
    • 1
  1. 1.Istituto di Elettrotecnica ed Elettronica, Politecnico di MilanoMilanoItaly

Personalised recommendations