Interaction of authorities and acquaintances in the DORIS privacy model of data

  • Hans Hermann Brüggemann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 364)


The information system DORIS has been designed to support privacy as the individual's right of informational self-determination. A person can hold two kinds of rights: Authorities on roles (allowing operations) which are statically declared for groups (classes), and acquaintances (access capabilities) that are dynamically granted to persons (instances). The interaction of authorities and acquaintances is studied and some pitfalls are identified. Solutions for circumventing these pitfalls are given. Surprisingly these solutions simplify the query language. An explicit mechanism for cooparating roles is introduced. All concepts are precisely described in syntax and semantics.


privacy role acquaintances authorities cooperating roles relational data manipulation language navigation surrogate query modification DORIS 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BiBr88]
    Biskup, J., Brüggemann, H.H., The Personal Model of Data — Towards a Privacy Oriented Information System, Computers & Security, Vol. 7 (1988), 575–597; Proc. 5th Int. Conf. on Data Engeneering, Los Angeles, 348–355.Google Scholar
  2. [BiGr88]
    Biskup, J., Graf, H.-W., Analysis of the Privacy Model for the Information System DORIS, Proc. 1988 Workshop on Database Security, Oct. 1988, Kingston, Ontario.Google Scholar
  3. [DMD88]
    Dobson, J.E., McDermid, J.A., Security Models and Enterprise Models, Proc. 1988 Workshop on Database Security, Oct. 1988, Kingston, Ontario.Google Scholar
  4. [LHM84]
    Landwehr, C.E., Heitmeyer, C.L., McLean, J., A Security Model for Military Message Systems, ACM Transactions on Computer Systems, Vol. 2, Aug. 1984, 198–222.Google Scholar
  5. [LoWo88]
    Lochovsky, F.H., Woo, C.C., Role-Based Security in Data Base Management Systems, in: Landwehr, C.E. (ed.), Database Security: Status and Prospects, North-Holland, 1988, 209–222.Google Scholar
  6. [MLH84]
    McLean, J., Landwehr, C.E., Heitmeyer, C.L., A Formal Statement of the MMS Security Model, Proc. IEEE Symposium on Security and Privacy, 1984, 188–194.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1989

Authors and Affiliations

  • Hans Hermann Brüggemann
    • 1
  1. 1.Department of Computer ScienceUniversity of HildesheimHildesheimWest Germany

Personalised recommendations