A model of authorization for object-oriented databases based on object views

  • Ahmad Baraani-Dastjerdi
  • Reihaneh Safavi-Naini
  • Josef Pieprzyk
  • Janusz R. Getta
Authorization and Views
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1013)


Several models of authorization for object-oriented databases, supporting different levels of granularity, have been proposed. However, these models do not support authorization based on database content and context. A way of handling context and content-dependent authorization is by using views. In this paper, we present a model of authorization that supports content-based access control on instances of a class.


Authorization System Access Control Discretionary Security View Mechanism View Hierarchy Access View Implication Rules 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    A. Baraani-Dastjerdi and J. R. Getta and J. Pieprzyk and R. Safavi-Naini. A Cryptographic Solution to Discretionary Access Control in Structurally Object-Oriented Databases. In Proceedings of the 6th Australian Database Conference (ADC'95), volume 17(2), pages 36–45. Australian Computer Science Communications, Ron Sacks and Justin Zobel (Eds), January 1995.Google Scholar
  2. 2.
    D. B. Faatz and D. L. Spooner. Discretionary Access Control in Object-Oriented Engineering Database Systems. In Database Security IV, S. Jajodia, and C.E. Lanwehr (Eds), pages 73–83. Elsevier Science Publishers B. V. (North-Holland) IFIP, 1991.Google Scholar
  3. 3.
    E. Bertino and H. Weigand. An Approach to Authorization Modelling in Object-Oriented Database Systems. In Data & Knowledge Engineering, P. P. Chen and R. P. Van de Riet (Eds), pages 1–29. Elsevier Science Publishers B. V. (North-Holland), 1994.Google Scholar
  4. 4.
    Elisa Bertino. A View Mechanism for Object-Oriented Databases. In Proceedings 3rd International Conference on Extending Data Base Technology (EDBT), Vienna, Austria, volume 580, pages 136–151. Springer-Verlag, Lecture Note in Computer Science, March 1992.Google Scholar
  5. 5.
    Elisa Bertino. Data Hiding and Security in Object-Oriented Databases. In Proceedings of the Eight International Conference on Data Engineering Edited by F. Golshani, pages 338–347. IEEE Computer Society Press, 1992.Google Scholar
  6. 6.
    F. Rabitti and E. Bertino and W. Kim and D. Woelk. A Model of Authorization for Next-Generation Database Systems. ACM Transactions on Database Systems, 16(1):88–131, March 1991.Google Scholar
  7. 7.
    J. K. Millen and T. F. Lunt. Security for Object-Oriented Database Systems. In Proceedings of IEEE computer Society Symposium on Research in Security and Privacy, Oakland, CA., pages 260–272. IEEE, May 1992.Google Scholar
  8. 8.
    K. R. Dittrich and M. Hartig and H. Pfefferle. Discretionary Access Control In Structurally Object-Oriented Database Systems. In Database Security II: Status and Prospects, C. E. Landwehr (Ed), pages 105–121. Elsevier Science Publishers B. V. (North-Holland), IFIP, 1989.Google Scholar
  9. 9.
    M. B. Thuraisingham. Mandatory Security in object-oriented database Systems. In Proceedings International Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), pages 203–210. New Orleans, October 1989.Google Scholar
  10. 10.
    M. M. Larrondo-Petrie and E. Guides and H. Song and E. B. Fernandez. Security Policies In Object-Oriented Databases. In Database Security III, D. L. Spooner and Landwehr (Eds), pages 257–269. Elsevier Science Publishers B. V. (North-Holland) IFIP, 1990.Google Scholar
  11. 11.
    M. S. Olivier and S. H. Von Solms. A Taxonomy for Secure Object-Oriented Databases. ACM Transactions on Database Systems, 19(1):3–46, March 1993.Google Scholar
  12. 12.
    R. Ahad and J. Davis and S. Gower and P. Lyngbaek and A. Marynowski and E. Onuegbe. Supporting Access Control in an Object-Oriented Database Language. In Proceedings of the 3rd International Conference on Extyending Database Technology, EDBT'92, Vienna, volume 580, pages 184–200. Springer-Verlag LCN in Computer Science, March 1992.Google Scholar
  13. 13.
    R. W. Baldwin. Naming and Grouping Privileges to Simplify Security Management Databases. In Proceedings of the 1990 IEEE Symposium on Security and Privacy, pages 116–132. IEEE Computer Society, 1990.Google Scholar
  14. 14.
    S. Abiteboul and A. Bonner. Objects and Views. In Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, J. Clifford and R. King (Eds), pages 238–247. ACM SIGMOD, 1991.Google Scholar
  15. 15.
    S. Heiler and S. Zdonik. Object Views: Extending the Vision. Proceedings 6th Data Engineering Confrence, IEEE Computer Society Press, pages 86–93, 1990.Google Scholar
  16. 16.
    S. Jajodia and B. Kogan. Integrating an Object-Oriented Data Model with Multilevel Security. IEEE, pages 76–85, 1990.Google Scholar
  17. 17.
    T. F. Keefe and W. T. Tsai and M. B. Thuraisingham. A Multilevel Security Model For Object-Oriented Systems. In Proceeding of the 11th National Computer Security Conference, pages 1–9. Baltimore, Maryland, October 1988.Google Scholar
  18. 18.
    T. F. Lunt and E. B. Fernandez. Database Security. SIGMOD RECORD, 19(4):90–97, December 1990.Google Scholar
  19. 19.
    U. Dayal. Queries and views in an Object-Oriented Data Model. International Workshop on Data Base Programming Languages, 2, 1989.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Ahmad Baraani-Dastjerdi
    • 1
  • Reihaneh Safavi-Naini
    • 1
  • Josef Pieprzyk
    • 1
  • Janusz R. Getta
    • 1
  1. 1.Department of Computer ScienceUniversity of WollongongWollongongAustralia

Personalised recommendations