A Protection Model Incorporating Both Authorization and Constraints

dc.contributor.authorKafura, Dennis G.en
dc.contributor.authorLaribi, Dr. Atikaen
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2013-06-19T14:36:28Zen
dc.date.available2013-06-19T14:36:28Zen
dc.date.issued1985en
dc.description.abstractThis paper presents a powerful and flexible protection model which includes both authorizations of open systems and constraints of closed systems. In this model, rules of 'inheritance" determine the authorizations which are created for new data derived by authorized computations from existing data. These rules create a middle-ground between purely discretionary and purely non-discretionary systems. Although the proposed protection model is quite general, it is presented in this paper in the context of a distributed relational database system. The core mechanisms of the model control access to all databases including the authorization and constraint data bases themselves. It is, therefore, a self-regulating and integrated system. The power and flexibility of the model derive from its use of authorizations and constraints as two complementary and interrelated types of control. The tight protection provided by closed systems is maintained since constraints are defined only as a complement to authorizations and not as a substitute. An enforcement algorithm is given which shows how the effects of the authorizations and constraints can be efficiently realized. Among other applications, it is shown how this model provides a useful, partial answer to the question of safety decidability.en
dc.format.mimetypeapplication/pdfen
dc.identifierhttp://eprints.cs.vt.edu/archive/00000002/en
dc.identifier.sourceurlhttp://eprints.cs.vt.edu/archive/00000002/01/TR-85-30.pdfen
dc.identifier.trnumberTR-85-30en
dc.identifier.urihttp://hdl.handle.net/10919/19602en
dc.language.isoenen
dc.publisherDepartment of Computer Science, Virginia Polytechnic Institute & State Universityen
dc.relation.ispartofHistorical Collection(Till Dec 2001)en
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.titleA Protection Model Incorporating Both Authorization and Constraintsen
dc.typeTechnical reporten
dc.type.dcmitypeTexten

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
TR-85-30.pdf
Size:
1.77 MB
Format:
Adobe Portable Document Format