Generalized dynamic authorization mechanisms

  • Yahiko Kambayashi
Part I, Concurrency Control And Access Control
Part of the Lecture Notes in Computer Science book series (LNCS, volume 143)


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Aho A.V., Hopcroft J.E. and Ullman J.D. (1974). The Design and Analysis of Computer Algorithm. Addison-Wesley, Reading Mass.Google Scholar
  2. Armstrong W.W. (1974). Dependency structures of data base relationships. Proc. IFIP Congress, 1974, pp 580–583.Google Scholar
  3. Beeri C. and Bernstein P.A. (1979). Computational problems related to the design of normal form relation schemes. ACM Trans. on Database Systems, Vol 4, No 2, March 1979, pp 30–59.Google Scholar
  4. Fagin R. (1978). On an authorization mechanism. ACM Trans. on Database Systems, Vol 3, No 3. Sept. 1978, pp 310–319.Google Scholar
  5. Graham G.S. and Denning P.J. (1972). Protection-Principles and practice. AFIPS SJCC, 1972, pp 417–429.Google Scholar
  6. Griffiths P.P. and Wade B.W. (1976). An authorization mechanism for a relational database system. ACM Trans. on Database Systems. Vol 1, No 3, Sept. 1976, pp 242–255.Google Scholar
  7. Harrison M.A., Ruzzo W.L. and Ullman J.D. (1976). Protection in operating system. Communications of the ACM, Vol 19, No 8. August 1976, pp 461–471.Google Scholar
  8. Thomas R.H. (1979). A majority consensus approach to concurrency control for multiple copy databases. ACM Trans. on Database Systems, Vol 4, No 2. June 1979, pp 180–209.Google Scholar
  9. Wood H.M. and Kimbleton S.R. (1979). Access control mechanisms for network operating system. AFIPS NCC, 1979, pp 821–829.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1982

Authors and Affiliations

  • Yahiko Kambayashi
    • 1
  1. 1.Department of Information ScienceKyoto UniversitySakyo, KyotoJAPAN

Personalised recommendations