Interaction of authorities and acquaintances in the DORIS privacy model of data
The information system DORIS has been designed to support privacy as the individual's right of informational self-determination. A person can hold two kinds of rights: Authorities on roles (allowing operations) which are statically declared for groups (classes), and acquaintances (access capabilities) that are dynamically granted to persons (instances). The interaction of authorities and acquaintances is studied and some pitfalls are identified. Solutions for circumventing these pitfalls are given. Surprisingly these solutions simplify the query language. An explicit mechanism for cooparating roles is introduced. All concepts are precisely described in syntax and semantics.
Keywordsprivacy role acquaintances authorities cooperating roles relational data manipulation language navigation surrogate query modification DORIS
Unable to display preview. Download preview PDF.
- [BiBr88]Biskup, J., Brüggemann, H.H., The Personal Model of Data — Towards a Privacy Oriented Information System, Computers & Security, Vol. 7 (1988), 575–597; Proc. 5th Int. Conf. on Data Engeneering, Los Angeles, 348–355.Google Scholar
- [BiGr88]Biskup, J., Graf, H.-W., Analysis of the Privacy Model for the Information System DORIS, Proc. 1988 Workshop on Database Security, Oct. 1988, Kingston, Ontario.Google Scholar
- [DMD88]Dobson, J.E., McDermid, J.A., Security Models and Enterprise Models, Proc. 1988 Workshop on Database Security, Oct. 1988, Kingston, Ontario.Google Scholar
- [LHM84]Landwehr, C.E., Heitmeyer, C.L., McLean, J., A Security Model for Military Message Systems, ACM Transactions on Computer Systems, Vol. 2, Aug. 1984, 198–222.Google Scholar
- [LoWo88]Lochovsky, F.H., Woo, C.C., Role-Based Security in Data Base Management Systems, in: Landwehr, C.E. (ed.), Database Security: Status and Prospects, North-Holland, 1988, 209–222.Google Scholar
- [MLH84]McLean, J., Landwehr, C.E., Heitmeyer, C.L., A Formal Statement of the MMS Security Model, Proc. IEEE Symposium on Security and Privacy, 1984, 188–194.Google Scholar