Abstract
Autonomous object databases are becoming important in the Internet world of today and involve integration of several local databases. Such databases support local access for transactions and queries and local control over authorization of classes and objects. At the same time, these database objects are often replicated in various sites and are available for access by global queries and transactions. Such global access, which may involve a global query optimizer, is required to handle conflicts between the local authorizations of replicated objects, but give consistent results regardless of site dependent optimizations.
The paper uses previous models for object-based authorization, and extends them with policies to handle conflicts between local and global authorizations. It also discusses object migration and security administration. The problem of providing autonomy in a consistent way is discussed extensively.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
EB Fernandez, E Gudes, H Song, “A Model for Evaluation and Administration of Security in Object-Oriented Databases,” IEEE Trans. on Knowledge and Data Engineering, 6, 2, April 1994, 275–292
N Gal-Oz, E Gudes and EB Fernandez, “A Model of Methods Access Authorization in Object-Oriented Databases,” Proc. of the 19th VLDB Conference, Dublin, Ireland, 1993
M Gendler-Fishman and E Gudes, “Compile-time flow analysis of transactions and methods in object-oriented databases,” in TY Lin, S Qian and R Sandhu (eds), Database Security XI, Status and prospects, Chapman and Hall, 1997, 95–109
D Jonscher and KR Dittrich, “Argos — A Configurable Access Control System for Interoperable Environments,” in DL Spooner, SA Demurjian and JE Dobson (eds), Database Security IX: Status and Prospects, Chapman and Hall, 1996, 43–60
W Kim, Introduction to Object-Oriented Databases,MIT Press, 1990
M Larrondo-Petrie, E Gudes, H Song, EB Fernandez, “Security Policies in object-oriented databases,” in DL Spooner and CE Landwehr (eds), Database Security IV: Status and Prospectus, Elsevier Science Publishers, 1990, 257–268
MS Olivier and SH von Solms, “A Taxonomy for Secure Object-oriented Databases”, ACM Transactions on Database Systems, 19, 1 (1994) 3–46
MS Olivier, “Self-protecting Objects in a Secure Federated Database”, in DL Spooner, SA Demurjian and JE Dobson (eds), Database Security IX: Status and Prospects, Chapman and Hall, 1996, 27–42
P Samarati, E Bertino, A Ciampichetti and S Jajodia, “Information Flow Control in Object-Oriented Systems,” IEEE Trans. on Knowledge and Data Engineering, 9, 4, August 1997, 524–538
R Sandhu, E Coyne, H Feinstein and C Youman, “Role-Based Access Control Models,” IEEE Computer, 29, 2, February 1996
Z Tari and G Fernandez, “Security enforcement in the DOK federated database system,” in P Samarati and R Sandhu (eds), Database Security X, Status and prospects, Chapman and Hall, 1997, 3–42
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media New York
About this chapter
Cite this chapter
Gudes, E., Olivier, M.S. (1999). Security Policies in Replicated and Autonomous Databases. In: Jajodia, S. (eds) Database Security XII. IFIP — The International Federation for Information Processing, vol 14. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35564-1_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-35564-1_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-4914-4
Online ISBN: 978-0-387-35564-1
eBook Packages: Springer Book Archive